SlideShare a Scribd company logo
1 of 3
Download to read offline
Q3.
Team: White Board
Member:
s1200085 Aya Higuchi
s1200102 Taiki Urakawa
s1200089 Hiroki Ogata
s1200103 Yusuke Suzuki
s1200097 Ryuki Shoju
I think following graphics are important.
First graphic is this.
Figure 1: where every buttons and functions are.
This graphic explain about where every buttons and functions are. The iPhone5 has many
buttons. So, if user manual didn’t have this graphic, you can’t understand some words or
buttons. This graphic is effective for understanding more clearly and easy. And iPhone5
equips many functions. They are designed very small. For example, camera, FaceTime
camera. But if you see this graphic, will understand each one of them purpose.
Second graphics are these.
Figure 2: how to transfer the data
These graphics explain about how to transfer the data. Many people who now use iPhone5,
are used to use old model like iPhone4. And they buy iPhone5 in order to replace old
model. But, many people don’t know how to transfer the data from old model to iPhone5.
If people unsuccessful transferring the data, it’s a great loss. So, I think many people need
clearly guide of how to transfer the data that be used text and graphics.
Third graphics are these.
Figure 3: how to use the tethering
These graphics explain about how to use the tethering. The tethering is communications
function. The iPhone5 can use as Wi-Fi router by the tethering. Thus, your computer or
game machine that don’t support communications function, always enjoy to the Internet
by iPhone5. So, the tethering is popular and one of the great iPhone5’s attractions. But,
many people don’t know how to use the tethering and it structure. I think these graphics
are important in order to people have more fun with iPhone5 and make iPhone5
convenient for them life by the tethering.

More Related Content

Viewers also liked (8)

How to make background of graphic transparency
How to make background of graphic transparencyHow to make background of graphic transparency
How to make background of graphic transparency
 
Pelatihan penyaringan air
Pelatihan penyaringan airPelatihan penyaringan air
Pelatihan penyaringan air
 
How to write effective business e mails
How to write effective business e mailsHow to write effective business e mails
How to write effective business e mails
 
Streality
StrealityStreality
Streality
 
Twitter拡散力の話
Twitter拡散力の話Twitter拡散力の話
Twitter拡散力の話
 
新卒が半年で転職をした話
新卒が半年で転職をした話新卒が半年で転職をした話
新卒が半年で転職をした話
 
Literary quiz ppt delhi public school,vja quiz master pallishree rath
Literary quiz ppt delhi public school,vja quiz master pallishree rathLiterary quiz ppt delhi public school,vja quiz master pallishree rath
Literary quiz ppt delhi public school,vja quiz master pallishree rath
 
Verb phrase
Verb phraseVerb phrase
Verb phrase
 

Similar to Q3

Sw3assignment8
Sw3assignment8Sw3assignment8
Sw3assignment8
s1190177
 
Sw3assignment8
Sw3assignment8Sw3assignment8
Sw3assignment8
s1190183
 
Mobile app design document
Mobile app design documentMobile app design document
Mobile app design document
Neeru Seth
 
Pp production log_template
Pp production log_templatePp production log_template
Pp production log_template
ClaySkorski
 
Pp production log_template
Pp production log_templatePp production log_template
Pp production log_template
ClaySkorski
 
Graphics Workbook
Graphics WorkbookGraphics Workbook
Graphics Workbook
Adam Sykes
 

Similar to Q3 (20)

#7
#7#7
#7
 
Q1
Q1Q1
Q1
 
Q1
Q1Q1
Q1
 
Sw3assignment8
Sw3assignment8Sw3assignment8
Sw3assignment8
 
Sw3assignment8
Sw3assignment8Sw3assignment8
Sw3assignment8
 
Mobile app design document
Mobile app design documentMobile app design document
Mobile app design document
 
Ayşegül fırat 20112574 eng204
Ayşegül fırat 20112574 eng204Ayşegül fırat 20112574 eng204
Ayşegül fırat 20112574 eng204
 
Technologies Used
Technologies UsedTechnologies Used
Technologies Used
 
Question 6 Evaluation
Question 6 EvaluationQuestion 6 Evaluation
Question 6 Evaluation
 
Week14
Week14Week14
Week14
 
IT service and phone usage patterns of iphone users and its implications
IT service and phone usage patterns of iphone users and its implicationsIT service and phone usage patterns of iphone users and its implications
IT service and phone usage patterns of iphone users and its implications
 
Pp production log_template
Pp production log_templatePp production log_template
Pp production log_template
 
Pp production log_template
Pp production log_templatePp production log_template
Pp production log_template
 
Problem
ProblemProblem
Problem
 
reptProblem
reptProblemreptProblem
reptProblem
 
Graphics Workbook
Graphics WorkbookGraphics Workbook
Graphics Workbook
 
Get your lost iPhone files from Backup!
Get your lost iPhone files from Backup!Get your lost iPhone files from Backup!
Get your lost iPhone files from Backup!
 
salesprop2_Tirado_S
salesprop2_Tirado_Ssalesprop2_Tirado_S
salesprop2_Tirado_S
 
IoT interview questions.
IoT interview questions.IoT interview questions.
IoT interview questions.
 
Sys 214 Final Exam
Sys 214 Final ExamSys 214 Final Exam
Sys 214 Final Exam
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

Q3

  • 1. Q3. Team: White Board Member: s1200085 Aya Higuchi s1200102 Taiki Urakawa s1200089 Hiroki Ogata s1200103 Yusuke Suzuki s1200097 Ryuki Shoju I think following graphics are important. First graphic is this. Figure 1: where every buttons and functions are. This graphic explain about where every buttons and functions are. The iPhone5 has many buttons. So, if user manual didn’t have this graphic, you can’t understand some words or buttons. This graphic is effective for understanding more clearly and easy. And iPhone5 equips many functions. They are designed very small. For example, camera, FaceTime camera. But if you see this graphic, will understand each one of them purpose.
  • 2. Second graphics are these. Figure 2: how to transfer the data These graphics explain about how to transfer the data. Many people who now use iPhone5, are used to use old model like iPhone4. And they buy iPhone5 in order to replace old model. But, many people don’t know how to transfer the data from old model to iPhone5. If people unsuccessful transferring the data, it’s a great loss. So, I think many people need clearly guide of how to transfer the data that be used text and graphics.
  • 3. Third graphics are these. Figure 3: how to use the tethering These graphics explain about how to use the tethering. The tethering is communications function. The iPhone5 can use as Wi-Fi router by the tethering. Thus, your computer or game machine that don’t support communications function, always enjoy to the Internet by iPhone5. So, the tethering is popular and one of the great iPhone5’s attractions. But, many people don’t know how to use the tethering and it structure. I think these graphics are important in order to people have more fun with iPhone5 and make iPhone5 convenient for them life by the tethering.