StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Systems Development: Mobile Device Development of Edugame - Lab Report Example

Cite this document
Summary
"Information Systems Development: Mobile Device Development of Edugame" paper describes the working of the game in detail. Endgame is one such initiative that aims to enhance the knowledge of users of mobile devices by allowing them to play an educational game that would test them in different areas…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Information Systems Development: Mobile Device Development of Edugame
Read Text Preview

Extract of sample "Information Systems Development: Mobile Device Development of Edugame"

Download file to see previous pages

The game will be hosted by a software application that can be accessed by the user upon supplying the relevant username and password. With this in place, the user is now shown an option to select a topic of choice as well as a preferred difficulty level. The selection of these two criteria helps the software code to generate the appropriate set of questions, which is then presented to the user to answer. The user then selects an option out of 4 choices shown against a question and repeats this process for every question.

At the end of the test, the application evaluates the player’s responses against the correct answers and calculates the score, which is then presented to the user. The user is then free to compare the obtained score against the score of other competitors to gain an understanding of their standing among others. As such, scores can be compared against others over a time range or against a ranking of the highest scores obtained among all players so far. Upon the development of the game, the software application was tested extensively for two primary purposes. The first was to ensure that each function that was planned had been provided for in an error-free manner. The second phase of testing was aimed at optimizing the performance of the application to allow it to run speedily and efficiently within the constrained environment of a mobile device. The logical flow of the game underwent several modifications to provide a sense of constancy within the whole range of the application. The language used in content within the application has been kept very simple to allow the game to be played by all age groups. The game has also been provided with an administration module that will be operated by an external administrator. Any changes to the software and the content will be updated and synchronized with the content within the mobile device of the player regularly through a network-based transfer. There is also a feature to upgrade the software automatically in the event of the development of any additional patches to the software. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Systems Development: mobile device development Lab Report”, n.d.)
Information Systems Development: mobile device development Lab Report. Retrieved from https://studentshare.org/miscellaneous/1551865-information-systems-development-mobile-device-development
(Information Systems Development: Mobile Device Development Lab Report)
Information Systems Development: Mobile Device Development Lab Report. https://studentshare.org/miscellaneous/1551865-information-systems-development-mobile-device-development.
“Information Systems Development: Mobile Device Development Lab Report”, n.d. https://studentshare.org/miscellaneous/1551865-information-systems-development-mobile-device-development.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems Development: Mobile Device Development of Edugame

Threats to Mobile Phone Users Privacy

When laptops are kept open as well as unattended, the physical vulnerability can occur as different relevant data becomes exposed to threats and network access can be done by others using the device.... This report "Threats to mobile Phone Users' Privacy" discusses significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users.... Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n....
9 Pages (2250 words) Report

Information Security Management

This paper ''information Security Management'' takes a look at the security threats that an SME faces online and its need of information security management to tackle these threats.... This paper would take a look at the security threats that an SME faces online and its need of information security management to tackle these threats.... Any significant loss of data or leakage of secret information could destroy the entire business (GFI software, 2009)....
18 Pages (4500 words) Research Proposal

Information Systems Consoltancy skills

Such a system and its development process have been discussed and the conclusion arrived at is that for such a development involvement of the Chief Information Officer They act as the catalyst between the consultants or the clients and the developers of the solution on the other.... ately the Consultants at WPC as well as the employees of the various clients have become more mobile and in order to save time need to access their colleagues, counterparts, clients and head offices from remote locations to access and deliver information....
12 Pages (3000 words) Essay

Building an App Farm for University Student

This article describes the development of a pedagogical environment that would like to influence the learning and experiences of university students as mobile app end users, developers, and decision makers.... For one to use the mobile apps they need to have a smart phone, tablet, or another device that can be used to access the internet.... here is a lot of data that apps can access, when you sign in to app stores, or download single apps, you may be asked for a permission to allow the app to get the information on the device you are using....
19 Pages (4750 words) Article

Key Features of Cyber Security

Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile-based device to any information system by utilizing a particular or a combination of varied data transfer methods.... The author of this coursework "Key Features of Cyber Security" describes significant cybersecurity vulnerability and associated threats in mobile computing.... This paper outlines the policies and procedures that can manage the vulnerability and threats in mobile computing....
9 Pages (2250 words) Coursework

Mobile Forensics: Mobile Phones Handsets, SATNA V, PDA, USB

The author explains that mobile device forensics generally is a branch of digital forensics that recovers digital evidence or digital data from a mobile device through the use of forensic sound conditions.... The forensic device would be a digital device that has both internal memory and communication ability.... The project 'mobile Forensics: mobile Phones Handsets, SATNAV, PDA, USB' is aimed at creating awareness among the public on the importance of studying mobile forensics....
8 Pages (2000 words) Assignment

Communication and Media Development

This paper ''Communication and Media Development'' tells that The advancement in the development of technologies has enhanced communication.... The development of Web 3.... Today, technologies such as the internet, mobile devices, and web-based applications have made communication cheap and easy.... The compatibility of mobile operating systems and networks with fixed network access systems and radio systems will improve in the next 10 years....
6 Pages (1500 words) Essay

Use of Mobile Phone and While Driving

A mobile phone also called a handphone, cell phone or cellular phone is a device that can be used to receive and make telephone calls over radio frequency while the persons making the calls or receiving the calls are moving around the different or same geographical areas.... A mobile phone also called a handphone, cell phone or cellular phone is a device that can be used to receive and make telephone calls over radio frequency while the persons making the calls or receiving the calls are moving around the different or same geographical area (Davies, 2010)....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us