3 Jan 2023

93

User Flow and Wireframes in UI/UX Design

Format: APA

Academic level: College

Paper type: Research Paper

Words: 401

Pages: 2

Downloads: 0

Part A: Task Flow: Customer Order and Pays 

When using the food ordering platform to order food. There are various simple processes that the customer will perform. Using the platform starts when the customer logs into it, and his phone is already connected to the internet. Once on the food ordering platform, the customer is shown the day’s chef’s special offer. The customer also has access to a search function that enables him to search for their desired food using the food name, ingredient or meal such as supper, dinner, snack, breakfast, and others. Alternatively the customer can scroll through the menu and select the food and beverages he finds enticing. The customer selects add to plate, thus selecting the desired food. Once he has selected the food and beverages he intends to take at the time, he proceeds to checkout whereby the platform allows him to pay using his preferred third party payment service provider. These are the only activities that are conducted strictly by the customer. Once the order is made, the customer waits for his meal. 

Sample Menu 

Menu 

Item Price 

Entrées 

Spaghetti & Marinara 8.3 
Spaghetti & Sausage or Meatballs 8.5 
Lasagna 8.5 

Beverages 

Morir soñando 3.4 
Negroni 2.25 
Aperitivo 3.5 

Sided Dishes 

Ratatouille 5.00 
Zucchini 5.25 
Sub Pasta Salad 5.25 
It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Part B: Wireframe and Flow between Wireframes 

Part C: Design Strategies 

Various strategies have gone into the above design to address human recognition, recall and to support user activities as well as facilitate learning. The design embodies usefulness, consistency, simplicity, error prevention and handling, efficiency and usability judgment which ensure that the users get the maximum possible satisfaction they can draw from , using the food ordering platform Finalizing on the design will involve incorporation of more strategies and features the will make the prototype more users friendly (Komninos, 2019). The additional strategies may include making the design more visible, ensuring their system matches the real world experience, enhancing user freedom and control, enhancing consistency, as well as enhancing recognition. Enhancing recognition can ensure that users do not have to rely on recalling information. The design will also be aesthetic and incorporate minimalism to avoid irrelevantly and rarely needed information or uses (Principles for Usable Design, 2012). Documentation will also be necessary and can help user document different information 

The design will also be modified to make it adaptable and thus make it usable on a different platform. Users generally use different devices ranging from computers, laptops, tablets, and smartphones. All these devices have different capabilities and different screen sizes. Making the design adaptable ensure the user will manage to use the platform on their devices, irrespective of their screen sizes or the device capabilities. 

References 

Principles for Usable Design (2012). The Usability Body of Knowledge . Retrieved from https://www.usabilitybok.org/principles-for-usable-design 

Komninos, A. (2019). 7 UX Deliverables: What will I be making as a UX designer? retrieved from https://www.interaction-design.org/literature/article/7-ux-deliverables-what-will-i-be-making-as-a-ux-designer 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). User Flow and Wireframes in UI/UX Design.
https://studybounty.com/user-flow-and-wireframes-in-ui-ux-design-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration