analysis walkthrough

  • 1Cognitive walkthrough — The cognitive walkthrough method is a usability inspection method used to identify usability issues in a piece of software or web site, focusing on how easy it is for new users to accomplish tasks with the system. Whereas cognitive walkthrough is …

    Wikipedia

  • 2Pluralistic walkthrough — The Pluralistic Walkthrough (also called a Participatory Design Review, User Centered Walkthrough, Storyboarding, Table Topping, or Group Walkthrough) is a usability inspection method used to identify usability issues in a piece of software or… …

    Wikipedia

  • 3Use-case analysis — A use case analysis is the most common technique used to identify the requirements of a system (normally associated with software/process design) and the information used to both define processes used and classes (which are a collection of actors …

    Wikipedia

  • 4Metal Gear Solid 2: Sons of Liberty — Разработчик KCEJ Success (Windows порт) Bluepoint Games (HD порт) …

    Википедия

  • 5Metal Gear Solid 2: Sons of Liberty — Developer(s) KCEJ Success (PC) Bluepoint Games (HD port) Publishe …

    Wikipedia

  • 6Usability — is a term used to denote the ease with which people can employ a particular tool or other human made object in order to achieve a particular goal. Usability can also refer to the methods of measuring usability and the study of the principles… …

    Wikipedia

  • 7Locations in the Half-Life series — The Half Life series of video games features many locations set in an dystopian future stemming from the events of the first game, Half Life . These locations are used and referred to throughout the series. The locations, for the most part, are… …

    Wikipedia

  • 8Locations of Half-Life — The Half Life series of video games features many locations set in a dystopian future stemming from the events of the first game, Half Life. These locations are used and referred to throughout the series. The locations, for the most part, are… …

    Wikipedia

  • 9Software Security Assurance — Software is itself a resource and thus must be afforded appropriate security. Software also contains and controls data and other resources. Therefore, it must be designed and implemented to protect those resources. Software Security Assurance is… …

    Wikipedia

  • 10BioShock — For the video game series, see BioShock (series). BioShock …

    Wikipedia