SlideShare a Scribd company logo
1 of 15
Software Engineering: 19
User interface Design Elements
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
User-system interaction
• Two problems must be addressed in
interactive systems design
– How should information from the user be
provided to the computer system?
– How should information from the computer
system be presented to the user?
• User interaction and information presentation
may be integrated through a coherent
framework such as a user interface metaphor
Interaction styles
1. Direct manipulation
2. Menu selection
3. Form fill-in
4. Command language
5. Natural language
1. Direct manipulation Advantages
• Users feel in control of the computer and are
less likely to be intimidated by it
• User learning time is relatively short
• Users get immediate feedback on their actions
so mistakes can be quickly detected and
corrected
1. Direct manipulation problems
• The derivation of an appropriate information
space model can be very difficult
• Given that users have a large information
space, what facilities for navigating around
that space should be provided?
• Direct manipulation interfaces can be complex
to program and make heavy demands on the
computer system
2.Menu systems
• Users make a selection from a list of
possibilities presented to them by the system
• The selection may be made by pointing and
clicking with a mouse, using cursor keys or by
typing the name of the selection
• May make use of simple-to-use terminals such
as touchscreens
2. Menu systems Advantages
• Users need not remember command names
as they are always presented with a list of
valid commands
• Typing effort is minimal
• User errors are trapped by the interface
• Context-dependent help can be provided. The
user’s context is indicated by the current
menu selection
Problems with menu systems
• Actions which involve logical conjunction
(and) or disjunction (or) are awkward to
represent
• Menu systems are best suited to presenting a
small number of choices. If there are many
choices, some menu structuring facility must
be used
• Experienced users find menus slower than
command language
3. Form-based interface
4. Command interfaces
• User types commands to give instructions to
the system e.g. UNIX
• May be implemented using cheap terminals.
• Easy to process using compiler techniques
• Commands of arbitrary complexity can be
created by command combination
• Concise interfaces requiring minimal typing
can be created
Problems with command interfaces
• Users have to learn and remember a
command language. Command interfaces are
therefore unsuitable for occasional users
• Users make errors in command. An error
detection and recovery system is required
• System interaction is through a keyboard so
typing ability is required
Command languages
• Often preferred by experienced users because
they allow for faster interaction with the
system
• Not suitable for casual or inexperienced users
• May be provided as an alternative to menu
commands (keyboard shortcuts). In some
cases, a command language interface and a
menu-based interface are supported at the
same time.
5. Natural language interfaces
• The user types a command in a natural
language.
• Generally, the vocabulary is limited and these
systems are confined to specific application
domains
• NL processing technology is now good enough
to make these interfaces effective for casual
users but experienced users find that they
require too much typing
Assignment
• Discuss in detail the various interaction style
elements in user interface design
• Thank You
Software engineering 19 user interface design elements

More Related Content

What's hot

Functionsofoperatingsystem 100406100459-phpapp02
Functionsofoperatingsystem 100406100459-phpapp02Functionsofoperatingsystem 100406100459-phpapp02
Functionsofoperatingsystem 100406100459-phpapp02Royalty123
 
Lms powerpoint
Lms powerpointLms powerpoint
Lms powerpointBishar Bn
 
Student result management system
Student result management systemStudent result management system
Student result management systemKazi Emad
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management systemMd. Touhidur Rahman
 
Course registration system
Course registration systemCourse registration system
Course registration systemHuda Seyam
 
Online course reservation system
Online course reservation systemOnline course reservation system
Online course reservation systemChamma Jabeedkhan
 
The Operating System
The Operating SystemThe Operating System
The Operating Systemandyr91
 
E learning management system
E learning management systemE learning management system
E learning management systemJas Soloria
 

What's hot (11)

Student Result Management System
Student Result  Management System Student Result  Management System
Student Result Management System
 
Functionsofoperatingsystem 100406100459-phpapp02
Functionsofoperatingsystem 100406100459-phpapp02Functionsofoperatingsystem 100406100459-phpapp02
Functionsofoperatingsystem 100406100459-phpapp02
 
Lms powerpoint
Lms powerpointLms powerpoint
Lms powerpoint
 
Student result management system
Student result management systemStudent result management system
Student result management system
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management system
 
ZeroCampus-LMS-Proposal
ZeroCampus-LMS-ProposalZeroCampus-LMS-Proposal
ZeroCampus-LMS-Proposal
 
Student Result
Student ResultStudent Result
Student Result
 
Course registration system
Course registration systemCourse registration system
Course registration system
 
Online course reservation system
Online course reservation systemOnline course reservation system
Online course reservation system
 
The Operating System
The Operating SystemThe Operating System
The Operating System
 
E learning management system
E learning management systemE learning management system
E learning management system
 

Similar to Software engineering 19 user interface design elements

User Interface design & methods for easy utilization
User Interface design & methods for easy utilizationUser Interface design & methods for easy utilization
User Interface design & methods for easy utilizationDipali M
 
Slide 4 - User Interface Design.pptx interface rather than its functionality ...
Slide 4 - User Interface Design.pptx interface rather than its functionality ...Slide 4 - User Interface Design.pptx interface rather than its functionality ...
Slide 4 - User Interface Design.pptx interface rather than its functionality ...DennisAnaafi1
 
Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Anwal Mirza
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principalsAnwal Mirza
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15koolkampus
 
Software engineering 18 user interface design
Software engineering 18 user interface designSoftware engineering 18 user interface design
Software engineering 18 user interface designVaibhav Khanna
 
Designing user interface module 4
Designing user interface module 4Designing user interface module 4
Designing user interface module 4DBPMCF
 
Lecture (User Interface Design).ppt
Lecture (User Interface Design).pptLecture (User Interface Design).ppt
Lecture (User Interface Design).pptskknowledge
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdfKaiEnTee1
 
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.ppt
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.pptWINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.ppt
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.pptVivekananda Gn
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptVivekananda Gn
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptVivekananda Gn
 
1 Introduction to OS.ppt
1 Introduction to OS.ppt1 Introduction to OS.ppt
1 Introduction to OS.pptKumarVaibhav100
 

Similar to Software engineering 19 user interface design elements (20)

User Interface design & methods for easy utilization
User Interface design & methods for easy utilizationUser Interface design & methods for easy utilization
User Interface design & methods for easy utilization
 
User interface design
User interface designUser interface design
User interface design
 
Slide 4 - User Interface Design.pptx interface rather than its functionality ...
Slide 4 - User Interface Design.pptx interface rather than its functionality ...Slide 4 - User Interface Design.pptx interface rather than its functionality ...
Slide 4 - User Interface Design.pptx interface rather than its functionality ...
 
Hci [4]interaction
Hci [4]interactionHci [4]interaction
Hci [4]interaction
 
Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Hci user interface-design principals lec 7
Hci user interface-design principals lec 7
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principals
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
 
Software engineering 18 user interface design
Software engineering 18 user interface designSoftware engineering 18 user interface design
Software engineering 18 user interface design
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
 
SECh1516
SECh1516SECh1516
SECh1516
 
Designing user interface module 4
Designing user interface module 4Designing user interface module 4
Designing user interface module 4
 
Lecture (User Interface Design).ppt
Lecture (User Interface Design).pptLecture (User Interface Design).ppt
Lecture (User Interface Design).ppt
 
HCI
HCIHCI
HCI
 
Imk pertemuan-4
Imk pertemuan-4Imk pertemuan-4
Imk pertemuan-4
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.ppt
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.pptWINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.ppt
WINSEM2021-22_SWE2004_ETH_VL2021220500570_2022-03-09_Reference-Material-I.ppt
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.pptWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-17_Reference-Material-I.ppt
 
1 Introduction to OS.ppt
1 Introduction to OS.ppt1 Introduction to OS.ppt
1 Introduction to OS.ppt
 
Chapter 12 user interface design
Chapter 12 user interface designChapter 12 user interface design
Chapter 12 user interface design
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

Software engineering 19 user interface design elements

  • 1. Software Engineering: 19 User interface Design Elements Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. User-system interaction • Two problems must be addressed in interactive systems design – How should information from the user be provided to the computer system? – How should information from the computer system be presented to the user? • User interaction and information presentation may be integrated through a coherent framework such as a user interface metaphor
  • 3. Interaction styles 1. Direct manipulation 2. Menu selection 3. Form fill-in 4. Command language 5. Natural language
  • 4. 1. Direct manipulation Advantages • Users feel in control of the computer and are less likely to be intimidated by it • User learning time is relatively short • Users get immediate feedback on their actions so mistakes can be quickly detected and corrected
  • 5. 1. Direct manipulation problems • The derivation of an appropriate information space model can be very difficult • Given that users have a large information space, what facilities for navigating around that space should be provided? • Direct manipulation interfaces can be complex to program and make heavy demands on the computer system
  • 6. 2.Menu systems • Users make a selection from a list of possibilities presented to them by the system • The selection may be made by pointing and clicking with a mouse, using cursor keys or by typing the name of the selection • May make use of simple-to-use terminals such as touchscreens
  • 7. 2. Menu systems Advantages • Users need not remember command names as they are always presented with a list of valid commands • Typing effort is minimal • User errors are trapped by the interface • Context-dependent help can be provided. The user’s context is indicated by the current menu selection
  • 8. Problems with menu systems • Actions which involve logical conjunction (and) or disjunction (or) are awkward to represent • Menu systems are best suited to presenting a small number of choices. If there are many choices, some menu structuring facility must be used • Experienced users find menus slower than command language
  • 10. 4. Command interfaces • User types commands to give instructions to the system e.g. UNIX • May be implemented using cheap terminals. • Easy to process using compiler techniques • Commands of arbitrary complexity can be created by command combination • Concise interfaces requiring minimal typing can be created
  • 11. Problems with command interfaces • Users have to learn and remember a command language. Command interfaces are therefore unsuitable for occasional users • Users make errors in command. An error detection and recovery system is required • System interaction is through a keyboard so typing ability is required
  • 12. Command languages • Often preferred by experienced users because they allow for faster interaction with the system • Not suitable for casual or inexperienced users • May be provided as an alternative to menu commands (keyboard shortcuts). In some cases, a command language interface and a menu-based interface are supported at the same time.
  • 13. 5. Natural language interfaces • The user types a command in a natural language. • Generally, the vocabulary is limited and these systems are confined to specific application domains • NL processing technology is now good enough to make these interfaces effective for casual users but experienced users find that they require too much typing
  • 14. Assignment • Discuss in detail the various interaction style elements in user interface design • Thank You