web design assignment 2
User Generated
Znyzny1
Computer Science
Description
Unformatted Attachment Preview
Design Exercise 2 Page Design
-
Scenario: Imagine that you are designing two different Web pages for a local hospital
about skin care protection from the sun. One page is geared toward 10-12 year-olds, and
the other page is geared toward adults.
-
Discuss the following questions for each page
-
Navigation scheme and navigation menu design (which navigation scheme and
which type of navigation menu will you use?)
-
How did you apply the CRAP guideline in your design? (Make sure you discuss
each of the four guidelines.)
-
How did you design the grid layout of the page?
-
How did you use white (negative space)?
-
How did you design typography?
-
How did you use color?
-
How did you use images, charts, or other multimedia materials?
-
How would the writing style be different between the two pages?
-
Develop a sample page for each user population. The page should clearly show the grid
design layout. The page should have at least one image and demonstrate the use of colors.
There should be reasonable amount of text to demonstrate the use typography.
-
All the content of the report must be neatly typed and printed. You may use Word,
PowerPoint, Expression Web, or any other software of your choice to design the two
pages. Note that your work will not be graded based on how visually appealing the pages
are, but on whether you have effectively applied the design principles that we discussed
during class.
-
Due date: Oct. 14, 2014
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
5 pages
Question 666.edited
In the case of Omega Engineering Corp, the following security controls could have helped avoid a breach. A comprehensive e ...
Question 666.edited
In the case of Omega Engineering Corp, the following security controls could have helped avoid a breach. A comprehensive endpoint solution that use ...
UMGC Privacy Security and Organizational Use of Social Media Analysis
Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, howev ...
UMGC Privacy Security and Organizational Use of Social Media Analysis
Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, however, it is necessary that the CISO and other business leaders understand the underlying issues and, where technology is involved, they must also understand those issues as well.
Read this article: https://www.bigcommerce.com/blog/social-media-advertising/#the-6-best-social-networks-for-ecommerce-advertising
Choose one of the social media platforms listed in the article above and research its privacy policy. Then prepare an "expert opinion" paper for the senior leaders in your organization. (If you cannot find the privacy policy for a given social media platform, choose a different platform.)
For your opinion paper, you must
perform additional research and then write your informed opinion as to the privacy issues that exist or may exist for that platform
identify specific privacy issues which could adversely affect Padgett-Beale
identify any additional issues with that platform which could adversely affect Padgett-Beale's cybersecurity posture
answer the following questions in your paper
What do you think about your selected platform's approach to privacy?
How would the platform's privacy policy impact an organization that is contemplating using the platform for advertising and marketing?
Which of the social media services provided by the platform would you allow Padgett-Beale's marketing department to use?
Should Padgett-Beale's employees in general be permitted to use the platform during the work day (using company networks and/or IT resources). What risks are involved with permitting such usage?
what type of policy would you recommend that Padgett-Beale adopt to govern the organization's use of social media platforms for marketing and other forms of internal and external communications?
professional organizations that offer mentoring
list three (3) professional organizations that would offer mentoring or career-focused advantages for graduates in the IT ...
professional organizations that offer mentoring
list three (3) professional organizations that would offer mentoring or career-focused advantages for graduates in the IT field. Describe the benefits that can be achieved from being engaged in professional social networking.
list at least three (3) certification programs for the information technology field or for a specific concentration. Specify the certification(s) that will be the most valuable when coupled with your degree.
JWD Consulting Case Study
Part 1 - After reading chapter three, discuss the main differences between the two versions of the JWD Consulting case stu ...
JWD Consulting Case Study
Part 1 - After reading chapter three, discuss the main differences between the two versions of the JWD Consulting case study. When should you use a more prescriptive or agile approach? Do you think users of the JWD Consulting Intranet site would prefer one release of the software or several incremental ones? What are some pros and cons of each approach?
Part 2 - Study the WBS and Gantt charts provided in Figures 3-3 and 3-4. Enter the WBS into Project, indenting tasks as shown to create the WBS hierarchy. Do not enter durations or dependencies. Submit a screenshot of the resulting Gantt chart.
13 pages
Healcare Provision App
Many online applications help facilitate the provision of many services today, this has many it possible for many people t ...
Healcare Provision App
Many online applications help facilitate the provision of many services today, this has many it possible for many people to access health services at ...
Scripting code planning
As a member of the software development team at your company, you have been asked to provide a plan for how your new GPS g ...
Scripting code planning
As a member of the software development team at your company, you have been asked to provide a plan for how your new GPS goods and services locator software application can provide automatic updates of the required data to your customers. Your task is to develop a plan, and submit it to your development team for implementation.Provide a plan for the software updates: Identify the major steps involved in the data file update process, and identify which of the steps can be performed using scripting.Select an appropriate scripting language for the tasks that can be performed using scripting, and justify your selection. Provide well-documented script code in the selected language for at least 2 of the functions that would be used within the major scripting tasks. For example, the scripted solution may be required to receive a query from a remote computer with a date of the remote computer’s data file, and the script must receive this request and determine if the remote computer’s data file is current.
Similar Content
NI mulitism program
Preview attachment Assignment_4.docAssignment_4.doc112 KBNi mulitism program is needed to do this assignment ...
UC Computer Science Implementation of Innovation Technologies Question
This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technol...
Nanyang Technological University Operating Systems True & False Questions
1. Static variables, local or global, are allocated in the (A) text segment; (B) data segment; (C)
stack segment; (D) depe...
Taylor University Correlations Questions
Question 1
Identify the mean, median, and mode for the following data set:
Pool 1C
17
17
17
19
21
22
24
25
25
26
28
Questi...
Campbellsville University Cluster of Binary Transactions Discussion
Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of t...
University of the Cumberlands Security Breach Case Discussion
Analyze the given case study on security breach.
Recommend controls to avoid an enterprise security breach
Read the attach...
Turnitin Report 2
File name: Web_Based_Attack_Case_Study.edited.docx (19.95K)...
Information Security Program 2
Information Security Program is a set of procedures and policies that prevent unauthorized access to vital information, th...
Matlab
Ans) truncating off the decimal/fractional portion of the number. Beginning year that Virginia started counting the popula...
Related Tags
Book Guides
Frankenstein
by Mary Shelley
The Metamorphosis
by Franz Kafka
We Were Eight Years in Power
by Ta-Nehisi Coates
The Outsiders
by S.E. Hinton
The Age of Innocence
by Edith Wharton
Daisy Miller
by Henry James
The Subtle Art of Not Giving a F*ck
by Mark Manson
Tess of the DUrbervilles
by Thomas Hardy
Too Much and Never Enough
by Mary L. Trump
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
5 pages
Question 666.edited
In the case of Omega Engineering Corp, the following security controls could have helped avoid a breach. A comprehensive e ...
Question 666.edited
In the case of Omega Engineering Corp, the following security controls could have helped avoid a breach. A comprehensive endpoint solution that use ...
UMGC Privacy Security and Organizational Use of Social Media Analysis
Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, howev ...
UMGC Privacy Security and Organizational Use of Social Media Analysis
Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, however, it is necessary that the CISO and other business leaders understand the underlying issues and, where technology is involved, they must also understand those issues as well.
Read this article: https://www.bigcommerce.com/blog/social-media-advertising/#the-6-best-social-networks-for-ecommerce-advertising
Choose one of the social media platforms listed in the article above and research its privacy policy. Then prepare an "expert opinion" paper for the senior leaders in your organization. (If you cannot find the privacy policy for a given social media platform, choose a different platform.)
For your opinion paper, you must
perform additional research and then write your informed opinion as to the privacy issues that exist or may exist for that platform
identify specific privacy issues which could adversely affect Padgett-Beale
identify any additional issues with that platform which could adversely affect Padgett-Beale's cybersecurity posture
answer the following questions in your paper
What do you think about your selected platform's approach to privacy?
How would the platform's privacy policy impact an organization that is contemplating using the platform for advertising and marketing?
Which of the social media services provided by the platform would you allow Padgett-Beale's marketing department to use?
Should Padgett-Beale's employees in general be permitted to use the platform during the work day (using company networks and/or IT resources). What risks are involved with permitting such usage?
what type of policy would you recommend that Padgett-Beale adopt to govern the organization's use of social media platforms for marketing and other forms of internal and external communications?
professional organizations that offer mentoring
list three (3) professional organizations that would offer mentoring or career-focused advantages for graduates in the IT ...
professional organizations that offer mentoring
list three (3) professional organizations that would offer mentoring or career-focused advantages for graduates in the IT field. Describe the benefits that can be achieved from being engaged in professional social networking.
list at least three (3) certification programs for the information technology field or for a specific concentration. Specify the certification(s) that will be the most valuable when coupled with your degree.
JWD Consulting Case Study
Part 1 - After reading chapter three, discuss the main differences between the two versions of the JWD Consulting case stu ...
JWD Consulting Case Study
Part 1 - After reading chapter three, discuss the main differences between the two versions of the JWD Consulting case study. When should you use a more prescriptive or agile approach? Do you think users of the JWD Consulting Intranet site would prefer one release of the software or several incremental ones? What are some pros and cons of each approach?
Part 2 - Study the WBS and Gantt charts provided in Figures 3-3 and 3-4. Enter the WBS into Project, indenting tasks as shown to create the WBS hierarchy. Do not enter durations or dependencies. Submit a screenshot of the resulting Gantt chart.
13 pages
Healcare Provision App
Many online applications help facilitate the provision of many services today, this has many it possible for many people t ...
Healcare Provision App
Many online applications help facilitate the provision of many services today, this has many it possible for many people to access health services at ...
Scripting code planning
As a member of the software development team at your company, you have been asked to provide a plan for how your new GPS g ...
Scripting code planning
As a member of the software development team at your company, you have been asked to provide a plan for how your new GPS goods and services locator software application can provide automatic updates of the required data to your customers. Your task is to develop a plan, and submit it to your development team for implementation.Provide a plan for the software updates: Identify the major steps involved in the data file update process, and identify which of the steps can be performed using scripting.Select an appropriate scripting language for the tasks that can be performed using scripting, and justify your selection. Provide well-documented script code in the selected language for at least 2 of the functions that would be used within the major scripting tasks. For example, the scripted solution may be required to receive a query from a remote computer with a date of the remote computer’s data file, and the script must receive this request and determine if the remote computer’s data file is current.
Earn money selling
your Study Documents