1. STORYBOARD EXCERPTS
Excerpts from various storyboards, describing different types of interactions.
Anita Kumar
anita.elearning@gmail.com
2. Click and Reveal Tabs (Accordion Style) Interaction
The learner must click the vertical tabs to view the corresponding content.
3. Product Life Cycle
Decline
Maturity
Growth
Introduction
This stage of the cycle is usually the most expensive for a
company launching a new product. The size of the market
for the product is small, which means sales are low,
although they could increase. The cost of research and
development, consumer testing, and the marketing
needed to launch the product can be very high, especially
if the product belongs to a competitive sector.
Introduction
4. Product Life Cycle
Decline
Introduction
Growth
In this stage, the product is accepted by the market. The
position of the product should be established and profit
margins should be improved. Manufacturing costs can be
brought down and a variety of promotional activity may be
used to encourage sales.
Growth
Maturity
5. Product Life Cycle
Decline
Growth
Introduction
Maturity
The product is established during the maturity stage. In this
stage, the company aims to maintain the market share that it
has built up. This is often the most competitive time for most
products. Hence, businesses need to invest wisely in any
marketing they undertake during this stage. They also need to
consider any product modifications or improvements to the
production process.
Maturity
6. Product Life Cycle
Growth
Introduction
Decline
This is the last stage in the product life cycle. In this stage,
there is a fall in both sales and profits. In spite of the
challenges in this stage, manufacturers can continue to make
a reasonable profit from their product in this stage.
Decline
Maturity
7. Click Hot Spot Interaction
The learner must click the blinking hotspots to learn about
employees located in different departments.
8. Alertness to Social Engineering
1
Click the hotspots to know the types of training that employees have recently taken.
1
3
2
9. Alertness to Social Engineering
1
David has recently completed Diversity
Training. The training has helped him
increase his awareness, knowledge, and
skills related to different cultures and
identity groups.
back
10. Alertness to Social Engineering
back
2Alex has successfully completed a
rigorous Quality Training course that will
help him prevent, detect and eliminate
non-quality items in the organization.
11. Drag and Drop Text Interaction
The learner must drag and drop the text options into their respective
pages to listen to the point related to that option. In this example,
the navigation is forced as it is not an assessment. Thus, the learner
can move the text option only to the correct page.
12. Drag the options to the appropriate page to learn more about the differences
between Java and Python.
Differences Between Java and Python
Dynamic Typing
Indentation
Braces
Static Typing
Portability
Speed
13. Drag the options to the appropriate page to learn more about the differences
between Java and Python.
Differences Between Java and Python
Static Typing
Dynamic Typing
Indentation
BracesPortability
Speed
14. Drag the options to the appropriate page to learn more about the differences
between Java and Python.
Differences Between Java and Python
Dynamic TypingStatic Typing
Portability
Indentation
Braces
Speed
15. Drag and Drop Image Interaction
The learner must drag and drop the images into the empty circle
provided. When an image is dropped into the circle, the
corresponding explanatory text is displayed.
16. Security Concerns of Employees
The security concerns of different employees in an organization are different.All employees
must receive security training based on their individual security concerns.
MODULE 1
Drag each employee’s image to the Drop Person Profile Here circle to view their unique security
concerns.
Drop Person
Profile Here.
17. Security Concerns of Employees
Position: Accountant
SecurityConcerns: Sheryl is
responsible for ensuring that the
company accomplishes the daily tasks
necessary for the company to meet its
strategic goals. She is concerned with
the downtime that occurs whenever
there is a security breach.
Sheryl Hanks
The security concerns of different employees in an organization are different.All employees
must receive security training based on their individual security concerns.
MODULE 1
more
Drag each employee’s image to the Drop Person Profile Here circle to view their unique security
concerns.
Java uses static typing, which means that it forces you to define the type of a variable when you first declare it and will not allow you to change the type later in the program.
Python uses dynamic typing, which means you can use your variables as you want to without worrying about their types.
Java is highly portable. Any computer or mobile device that is able to run the Java virtual machine can run a Java application.
Java uses static typing, which means that it forces you to define the type of a variable when you first declare it and will not allow you to change the type later in the program.
Python uses dynamic typing, which means you can use your variables as you want to without worrying about their types.
Java is highly portable. Any computer or mobile device that is able to run the Java virtual machine can run a Java application.