Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
8 principles of the Data Protection Act (1998)
|
1). Personal data shall be processed fairly and lawfully.
2). Personal data shall only be obtained for one (or more) specified legal purposes, and shall not be processed in any matter incompatible with these purposes. 3). Personal data shall not be excessive given the specified purpose(s) 4). Personal data shall be accurate and up-to-date. 5). Personal data shall not be kept longer than necessary 6). Personal data shall be processed in accordance with the rights of data subjects 7). Personal data will be protected against loss, destruction, damage, unlawful access or processing. 8). Personal data shall not be transferred to country or territory outside the European Economic Area unless adequate levels of protection and freedoms are guaranteed. |
|
Exemptions under the Data
Protection Act (1998) |
1). National security
2). Crime and taxation 3). Domestic purposes |
|
Computer Misuse Act (2000) - 3 new criminal offenses
associated with the use and misuse of computers |
1). Unauthorized access to computer material (programs or data)
2). Unauthorized access to a computer system with malicious intent or to facilitate serious crime 3). Unauthorized modification of computer material |
|
Intellectual Property Rights (IRP) - 4 aspects covered
|
1). Copyright
2). Moral rights 3). Patents 4). Trademarks |
|
Db level humans can be safely exposed to for 8 hours
|
90 db
|
|
reduced by half for every _____ db added to the 8 hour safe level
|
5 db
|
|
minimum and maximum audible sound (in db) for humans
|
15 db - 140 db
|
|
frequency range (in Hz - kHz) for human hearing
|
20Hz to 15kHz
|
|
four visual cues used by human sight
|
1). Visual Angle
2). Visual Acuity 3). Overlapping 4). Familiarity |
|
Computer Misuse Act (1990) three new principles of computer misuse
|
1). Unauthorized access to computer material (programs or data)
2). Unauthorized access to a computer system with malicious intent or to facilitate serious crime 3). Unauthorised modification of computer material |
|
Copyright, Designs and Patents Act (1988)
|
covers intellectual property rights
|
|
outer ear
|
protects ear, amplifies sound
|
|
middle ear
|
Transmits sounds as vibration to inner ear
|
|
inner ear
|
Causes impulses in auditory nerve
|
|
stimulus that elicits the quickest reaction time
|
auditory (150 ms)
|
|
Fitt's Law
|
describes the time taken to hit a screen target:
Mt = a + b log2 (D/S +1) |
|
Sensory Memory
|
-Acts as a buffer for stimuli received through
senses -Buffer allows temporary persistence of sensory information -continuously overwritten |
|
Short-Term Memory
|
-Used for temporary recall of information only
required fleeting. |
|
Long-Term Memory
|
-Where all knowledge is stored
-Two types: Episodic/Semantic -Episodic: serial memory of events -Semantic: structured memory of facts, concepts, skill. |
|
Usability
|
quality attribute that assesses how easy user interfaces are to use
|
|
three measurements of usability
|
effectiveness, efficiency, satisfaction
|
|
effectiveness
|
degree to which specific task could be accomplished by particular users working in a particular environment
|
|
efficiency
|
accuracy and completeness of goals in relation to effort expended
|
|
Satisfaction
|
comfort and acceptability of the system
|
|
five quality components of usability
|
Learnability, Efficiency, memorability, Errors, Satisfaction
|
|
learnability
|
How easy is it for users to accomplish
basic tasks the first time they encounter the design? |
|
Efficiency
|
Once users have learned the design, how quickly can they perform tasks?
|
|
Memorability
|
When users return to the design after a period of not using it, how easily can they reestablish proficiency?
|
|
errors
|
How many errors do users make, how severe are these errors, and how easily can they recover from the errors?
|
|
satisfaction
|
How pleasant is it to use the design?
|
|
User-Centred Design Process
|
1). Analysis
2). Design 3). Evaluation 4). Implementation 5). Deployment |
|
What to Evaluate (web design)
|
-Usability
-Objectives & aims -Fit for purpose -Efficiency -Learnability -Aesthetics |
|
Nielsen’s usability heuristics
|
1). Give feedback
2). Speak the user’s language 3). User control and freedom 4). Consistency and standards 5). Prevent errors 6). Minimise memory load 7). Shortcuts 8)). Aesthetic and minimalist design 9). Good error messages 10). Help and documentation and easy to search |
|
Schneiderman’s heuristics
(8 Golden Rules) |
1. Strive for consistency
2. Enable frequent users to use shortcuts 3. Offer informative feedback 4. Design dialogues to yield closure 5. Offer error prevention & simple error handling 6. Permit easy reversal of actions 7. Support internal locus of control (Individual believes that his/her behaviour is guided by his/her personal decisions and efforts. ) 8. Reduce short-term memory load |