Free Essay

Response Time for Computer System

In:

Submitted By sujitdhawalkar
Words 584
Pages 3
Memory, broadly speaking, refers to our ability to retain information. There are various types of memories that a person uses to retain information of his/her interest. Some on permanent basis and rest is on temporary basis. Long term memory which is also a knowledge base of the user stores the information on permanent basis whereas short term memory (STM) allows the person to retain items for a short period of time. As per the research, a typical adult’s memory span is approximately 7 (between 5 and 9) unrelated items, called chunks (Miller, 1956). A person can retain this information in the short term memory for about 18 seconds without paying attention to it. After this period, information can be lost or replaced with new incoming information in the short term memory. Whenever user want to interact with the world using the information from the short term and long term memory, a third type of memory i.e. working memory (WM) comes into picture which helps us make decisions, and remember and retrieve facts. Since user actively use these memories while interacting with the computer systems, a designer have to carefully consider their respective limitations while developing the interface for optimal performance.

User satisfaction is one of the key aspects that measures the success and popularity of a computer system or website. One important factor that contributes to user satisfaction is the response time of the system. Response time is generally measured as the number of seconds it takes from the moment a user initiates an action, usually by pressing the Enter Key or a mouse button, until the computer begins to present the results (Shneiderman B and Plaisant C., 2009). Once the system response is completed and observed by the user, he/she will start thinking on the next action in the process. Time taken between the computer’s response and the user’s initiation of next item is commonly referred as user think time. User’s short term memory along with the working memory plays an important role in this human computer interaction. User uses the short term memory in conjunction with working memory for processing the specific information to produce desired output. Short term memory possesses all the necessary inputs whereas working memory is used to generate and implement solution.

As explained earlier short term and working memory are highly volatile and any disruption or significant delay can cause loss of information or it requires memory to be refreshed. When the user is waiting for the response and if the system produced unexpected result or if it keeps the user waiting for a longer duration, there is a high risk that users may forget part of the plan or he/she might have to revisit the information continually. This can easily leads to the wasted efforts. One more point to consider here is that when the response time grows longer due to significant delays, the error rate increases with increase in user anxiety. This increase in error rate and wasted efforts contributes to user dis-satisfaction and discourage the user from using the specific system. Hence it’s very important to derive an optimal performance from the system by producing the response time that is well within the boundaries associated with the limitations of user’s short term and working memory. This is the primary reason why we should keep the delays short for everyday task of the user. It will help to keep the user more focused and engaged while interacting with the system.

Similar Documents

Premium Essay

Computer Systems Security

...Security Professor Corey Jackson Outline In order for a company to be successful it needs to ensure that the security of its network is up to par and can protect the data from 2.0 Incident-Response Policy for Gem Infosys. |Gem Infosys Policy Sections | |1.0 |Identification of Incidents/Threats | | |Gem Infosys incident-response policy requires that every personnel including the Information Security Office (ISO), report suspicious| | |activity during system usage, or while conducting a proactive monitoring of the organization’s network and information system | | |activities (Yale University Policy, 2012; SANS Institute, 2001). Reports will be done via incident reporting system tickets which | | |shall be sent to the authorized individuals or departments. | | |Symptoms of Computer Security Incidents; | | |System alarm from incorporated intrusion detection tools | | |Unsuccessful login attempts ...

Words: 1040 - Pages: 5

Premium Essay

Sample Tester Page

...Sample Email to myself Special Publication 800-61 Revision 2 Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Tom Millar Tim Grance Karen Scarfone Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security Tim Grance Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity NIST Special Publication 800-61 Revision 2 COMPUTER SECURITY August 2012 U.S. Department of Commerce Rebecca Blank, Acting Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses...

Words: 32495 - Pages: 130

Free Essay

The Impact of Computer in Our Modern Days Organization ( a Case Study of Federal College of Education Technical Asaba, Delta State)

...OF THE STUDY 1.0 INTRODUCTION The invention of computers has brought tremendous change into various aspects of human endeavor. In the 1960s computers were used by relatively few people but presently computer has great impact on our society than any other device invented in the second half of the 20th century. The impact of computer is felt in all professions for example, in medical line, computer is used in management information system, billing system and drug administration. Likewise in education computers are useful in teaching the basic skills. In office management the use of computer has made great impact on the area of our modern office equipment which had been automated such as typewriters, communication system and language translation. In business and professional office, computer is used in inventory. Control information processing, accounting programs payroll, designing and so on to mention but a few. Man enjoys entertainment, of the computer at home after a number of advantages, it allows on to practice in private keeps one of the street and it teaches one so many things in the area of Government, taking decision planning forecasting and budgeting and so on, the use of computer to process information and to make logical decision much faster than man is steadily being exploited. Computer have become an integral part of our lives having more advantage than disadvantage. Apart from the positive impacts of computers in our world, they affect our lives in some ways which...

Words: 5399 - Pages: 22

Premium Essay

Uuyv

...BTEC Level 3 90-credit Diploma In Information Technology (QCF) Unit no: 2 | Learner group: C2250, C0183, C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that you...

Words: 2093 - Pages: 9

Premium Essay

Security Policies and Implementation Week Four Lab

...Policies for Business Continuity - BIA & Recovery Time Objectives Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the major elements of a Business Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time frames. 1. Fill in the sample BIA with prioritization in (parentheses): Business Function Business Impact RTO/RPO IT Systems/Apps Or Process ...

Words: 1852 - Pages: 8

Premium Essay

Distributed Systems and Centralized Systems

...Distributed System and Centralized Failures By Kentrell Lanier POS/355 March 28, 2014 Paul Borkowski Distributed System and Centralized System Failures Distributed system is many computers linked together that take on different tasks and act like one big computer. Distributed system is found in business across the world. When computers are linked together they share the same database and server. Distributed system is constructed for resource sharing, computation speedup, reliability, and communication Distributed system have different names for the computers in the system. Names such as sites, nodes, computers, machines, and host. Each names goes to a computer that’s part of the system. Resource sharing is when computers link up and they have different data any user can use the data form any computer in the system. Computation speedup is when the system recognize that one computer is over worked so the system have computers that’s have less duties to perform the tasks. Computation speedup help the system from crashing and tasks are preformed quicker. Distributed systems are more reliable because if one computer crash or fail the others can share its responsibilities and system will continue running smoothly. By computers being link together the users can communicate between each other. Two Types of failure When dealing with computers there are two types of failures. You can have a hard drive failure or a software failure. A hard drive failure is when the disk drive fails to...

Words: 874 - Pages: 4

Free Essay

The Impact of Computer in Our Modern Days Organization ( a Case Study of Federal College of Education Technical Asaba, Delta State)

...OF THE STUDY 1.0 INTRODUCTION The invention of computers has brought tremendous change into various aspects of human endeavor. In the 1960s computers were used by relatively few people but presently computer has great impact on our society than any other device invented in the second half of the 20th century. The impact of computer is felt in all professions for example, in medical line, computer is used in management information system, billing system and drug administration. Likewise in education computers are useful in teaching the basic skills. In office management the use of computer has made great impact on the area of our modern office equipment which had been automated such as typewriters, communication system and language translation. In business and professional office, computer is used in inventory. Control information processing, accounting programs payroll, designing and so on to mention but a few. Man enjoys entertainment, of the computer at home after a number of advantages, it allows on to practice in private keeps one of the street and it teaches one so many things in the area of Government, taking decision planning forecasting and budgeting and so on, the use of computer to process information and to make logical decision much faster than man is steadily being exploited. Computer have become an integral part of our lives having more advantage than disadvantage. Apart from the positive impacts of computers in our world, they affect our lives in some ways which...

Words: 5399 - Pages: 22

Premium Essay

Gordyie

...The Uses of Computers in Education The h l g e informution-processing cupcities of c o m p u t e n m u k e it possible to use them to adapt mechanical teaching routines t o the needs and the p u s t p e r f o r m a n c e o f the indi(~idLm1 student by Patrick Suppes s other articles inthis issue make abundantly clear, both the - processing andthe uses of information areundergoinganunprecedented technological revolution. Not only are machines able deal now to with many kinds of information at high speedand in largequantitiesbut also it is possible to manipulate these quantities of information so as to benefit from them in entirely novel mays. This is perhapsnowheretruerthaninthe field of education. One can predict that in a few more years millions of schoolchildren will have access to what Philip of hlacedon’s son Alexander enjoyed as a royal prerogative: the personal services of a tutor as well-informed and responsive as Aristotle. The basis for this seemingly extravagant prediction is not apparent in many examinations of the computer’srole in education today. In themselves, howel’er, such examinations provide impressive evidence of the importance of computers on the educational scene, As an example, a recent report of the National Academy of Sciences states that by mid1965 more than 800 computers were in service on the campuses of various American universities and these that institutions spent $175 nillion for computers that year. The report goes on to forecast that by 1968...

Words: 7039 - Pages: 29

Premium Essay

Assignment

...Incident Response Plan Gurleen Kaur Sandhu Master of Information Systems Security and Management Concordia University of Edmonton 7128 Ada Boulevard Edmonton, AB gksandhu@student.concordia.ab.ca Abstract— In business oriented organizations, disasters can occur anytime if information security is jeopardized at some point of business operations. Whenever unplanned events happen, incident response plans are must for reducing the extremity and increasing the chances of quick resolution with minimal damage. An incident response plan is an integral part for an enterprise for reducing negative publicity and increasing the confidence of corporate staff.This paper provides steps constituting and utilizing Incident Response Plan. INTRODUCTION As said by an American lawyer Robert Mueller “There are only two types of companies:those that have been hacked and those that will be.” When an organization depends on technology based systems to remain practical,information security and risk management become an unavoidable part of the economic basis for making dicisions in a firm. In this challenging environment of increasing technology,data breaches are also increasing that require enterprises to protect proprietary data and implementing effective measures to prevent a data insecurity. Threats and vulnerabilities, in one form or another, will always affect information technology. Incident is an adverse event that negatively impacts the confidentiality, integrity and availability of...

Words: 1541 - Pages: 7

Premium Essay

Impact of Nationalism

...Computer Peripherals 1. Input Devices Input devices are used to capture the data and transmit it to the computer system for further processing and in computer readable form. Some of the input devices are as under: a) Keyboard Devices: keyboard devices are the most commonly used devices today. They allow data entry into a computer system by pressing a set of keys, which is connected to a computer system. Programs and data are entered into a computer through a keyboard. A keyboard is similar to a typewriter it contains Alphabets,digits,special chars and some control keys. When a key is pressed an electrical signal is produced which is detected by an electronic circuit called keyboard encoder. Its function is to detect which key has been pressed and send binary code for it. b) Point-and-Draw Devices: 1. Mouse: Mouse is the most popular point-and-draw device today. A mouse is called a pointing device. It moves across a flat surface with the help of tracking balls. Its movement and the direction of the movement is detected by two rotating wheels on the underside of the mouse called sensors. 2. Light Pen: A Light pen is a pointing device. It is used to select and write the text on the CRT. It is capable of sensing a position on the CRT screen when its tip touches the screen. 3. Trackball: A Trackball is a pointing device, similar to a mouse. The ball ...

Words: 2751 - Pages: 12

Premium Essay

Meteorite Impact and Dinosaur Extinction

...Reading Section Directions: These sample questions in the Reading section measure your ability to understand academic passages in English. You will read one passage and answer questions about it. In a real test, you would have 20 minutes to read the passage and answer the questions. Candidates with disabilities may request a time extension. Meteorite Impact and Dinosaur Extinction There is increasing evidence that the impacts of meteorites have had important effects on Earth, particularly in the field of biological evolution. Such impacts continue to pose a natural hazard to life on Earth. Twice in the twentieth century, large meteorite objects are known to have collided with Earth. 5 If an impact is large enough, it can disturb the environment of the entire Earth and cause an ecological catastrophe. The best-documented such impact took place 65 million years ago at the end of the Cretaceous period of geological history. This break in Earth’s history is marked by a mass extinction, when as many as half the species on the planet became extinct. While there are a dozen or more mass extinctions in the geological record, the Cretaceous mass extinction has always intrigued paleontologists because it marks the end of the age of the dinosaurs. For tens of millions of years, those great creatures had flourished. Then, suddenly, they disappeared. The body that impacted Earth at the end of the Cretaceous period was a meteorite with a mass of more than a trillion tons and a diameter of...

Words: 9073 - Pages: 37

Free Essay

Distance Learning Computer-Based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments

...Distance Learning and the Internet Conference 2008 5-2 Distance Learning Computer-based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments Patcharee Basu, Shoko Mikawa, Achmad Basuki, Achmad Husni Thamrin, Keiko Okawa, Jun Murai Keio University Plenary Sessions Waseda University Presentations {yoo, funya, abazh, husni, keiko, jun}@sfc.wide.ad.jp Abstract In response to the educational demands of computer-skilled human resources, distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs to...

Words: 4133 - Pages: 17

Free Essay

Lans

...volume of information that is handled. Chapter 2 provides an overview of the four basic categories of information used in any organization: audio, data, image, and video. The chapter discusses some of the salient characteristics of each type and looks at their networking implications. Chapter 3 Distributed Data Processing Chapter 3 describes the nature and role of distributed data processing (DDP) in an organization. Virtually all business information systems organizations are distributed, and the networking and communications requirements are driven by the way in which data and applications are distributed. ISBN 0-558-69515-9 31 Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright © 2009 by Pearson Education, Inc. CHAPTER BUSINESS INFORMATION 2.1 2.2 2.3 Audio Networking Implications Data Networking Implications Image Image Representation Image and Document Formats Networking Implications Video Digital Video Networking Implications Performance Measures Response Time Throughput Summary Recommended Reading and Web Sites Key Terms, Review Questions, and Problems 2.4 2.5 2.6 2.7 2.8 ISBN 0-558-69515-9 32 Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright © 2009 by Pearson Education, Inc. 2.1 / AUDIO 33 Chapter Objectives After reading this chapter, you should be able to ♦ Distinguish between digital and analog...

Words: 9067 - Pages: 37

Free Essay

Batch Processing

...Processing (AIS). There are two types of data processing cycle/methods in an Accounting information system, One is known as Batch processing method and the other is a real time processing method. The batch is a group of similar transactions that are accumulated over time and then processed together. The transactions must be independent from one another during the time period over which the accumulation of transaction has been done in an organized order which is appropriated for batch processing. There is always a time lag exists between the event and the processing. In batch processing the transaction data is stored in a transaction file till the performance of master file update. The storing of transaction file may occur through online or offline entry of data. The time lag is one characteristic used to distinguish between batch and real-time systems. Explain. Give an example of when each is a real choice. Lag time is the major characteristic that can distinguish batch processing from real time processing because batch processing is used only when there are a large number of files or where a quick response is not needed. It is a non-continuous/ Non real time processing of data, materials or instructions. The files that are needed to be transmitted are gathered over a period of time and then send together as a batch and are processed with minimal human interaction. While real time processing is that type of data processing which appears to take place or actually taking place ,...

Words: 1190 - Pages: 5

Premium Essay

Fhfhd

...Reading Section Directions: These sample questions in the Reading section measure your ability to understand academic passages in English. You will read one passage and answer questions about it. In a real test, you would have 20 minutes to read the passage and answer the questions. Candidates with disabilities may request a time extension. Meteorite Impact and Dinosaur Extinction There is increasing evidence that the impacts of meteorites have had important effects on Earth, particularly in the field of biological evolution. Such impacts continue to pose a natural hazard to life on Earth. Twice in the twentieth century, large meteorite objects are known to have collided with Earth. 5 If an impact is large enough, it can disturb the environment of the entire Earth and cause an ecological catastrophe. The best-documented such impact took place 65 million years ago at the end of the Cretaceous period of geological history. This break in Earth’s history is marked by a mass extinction, when as many as half the species on the planet became extinct. While there are a dozen or more mass extinctions in the geological record, the Cretaceous mass extinction has always intrigued paleontologists because it marks the end of the age of the dinosaurs. For tens of millions of years, those great creatures had flourished. Then, suddenly, they disappeared. The body that impacted Earth at the end of the Cretaceous period was a meteorite with a mass of more than a trillion tons and a diameter of...

Words: 9073 - Pages: 37