## Real time filtering or Wizard steps

At this moment, I’m working on a product finder tool. By answering different questions, you get advice that suggests a product of your interest. So, the answers to questions could lead to different follow-up questions. This process isn’t linear.

I notice while designing that there are different ways to approach this. – A Wizard gives clear steps that help to create focus and guides through finding the right product. – At the same time, we want to create something which provides the user with the possibility to realtime change things and play around with the settings to get a different result very fast. But I noticed that accordions are getting though and not the flexibility that we want.

I put some quick wireframes to give a better understanding of the context. Any suggestions on this case? Examples are appreciated!

## Real time filtering vs. Wizard steps

At this moment, I’m working on a product finder tool. By answering different questions, you get advice that suggests a product of your interest. So, the answers to questions could lead to different follow-up questions. This process isn’t linear.

I notice while designing that there are different ways to approach this. – A Wizard gives clear steps that help to create focus and guides through finding the right product. – At the same time, we want to create something which provides the user with the possibility to realtime change things and play around with the settings to get a different result very fast. But I noticed that accordions are getting though and not the flexibility that we want.

I put some quick wireframes to give a better understanding of the context. Any suggestions on this case? Examples are appreciated!

## Maximum number of steps using Euclid’s Algorithm

Using Euclids algorithm, is it true that the maximum number of steps of $$GCD(a, b)$$ is at most $$b$$ when $$a\geq b> 0$$? And if so why?

## What are the steps necessary to perform a Denial of Service (DoS) attack, assuming i have someones IP?

I am trying to learn much much more about computers and the hacking realm. I am very new at this, and i have been studying endlessly for answers. I went on TOR and asked this same question, but to only be greeted with most likely malware apps wanting me to download. So here i am, asking you fine folks, how do i run a successful DoS attack? This is one of the most simple attacks out there, and yet i have no idea how to perform one. From what i understand about computers, when you send a network IP packets of bytes, it breaks down the packets so it can process them, so how tf do you send enough packets of bytes to completely crash the network/ overload the network?

## What are the next steps to expressing the recurrence relation $c + nT(n^{\frac{1}{2}})$ in the form $T(n) \in O(n^x \log^y n)$?

I have an algorithm which solves a problem with $$n$$ subproblems each of size $$\sqrt{n}$$ with $$O(1)$$ combining time.

I understand that I can express the above as $$c + nT(n^{\frac{1}{2}})$$ where $$c$$ is the constant combining time.

By telescoping I get the following:
$$T(n) = c + nT(n^{\frac{1}{2}})$$
$$T(n) = c + n(c+ nT(n^{\frac{1}{4}}))$$
$$T(n) = c + nc + n^{2}T(n^{\frac{1}{4}})$$
$$T(n) = c + nc + n^{2}(c+nT(n^{\frac{1}{8}}))$$
$$T(n) =…$$

I’m supposed to be able to express this recurrence relation in the form $$T(n) \in O(n^x \log^y n)$$ where $$x$$ and $$y$$ are to be determined by me but I’m not really sure what the next steps are I should be taking.

Any pointers would be much appreciated.

## Steps for Website evaluation

I’ve been asked to do a website review and evaluation and suggest improvements.

The website is live and running, what should the steps be for this kind of work? Where should i begin?

## Multiple steps each with a tasks vs one step with multiple tasks (for the user)

I am sketching the user flow for a new feature of a fitness/medical recovery application that is using hardware sensors to monitor the way the user is performing certain fitness exercises.

In order for the user to begin the training he has to perform certain tasks before:

• position the sensors (two sensors) on the body or on a limb (i.e hand scenario), above and below the elbow
• be sure that the sensors are in a certain position (there are some LEDS* on one side of the sensors and they must face up)
• have the sensor centred on the body or on the limb
• strand the straps so the sensor/s does not fall off

If I place all of this in a single screen I am afraid there may be too much information and the screen may end up with a high cognitive load. I would like to split this in multiple screens and after the user goes through this at least 2-3 times, wrap it up in a single screen as the user will be familiar with the process.

Currently I am in an argument regarding splitting the screen, as mentioned above. The team has a solid point against splitting the screen into mutiple screens: the “onboarding process” until the user can start training, beside this screen, contains 6-7 more screens. From these 6-7 screens at least 4 require the user to do at least one action (i.e. move a the limb with the sensors).

If the user does not perform these tasks successfully the hardware device won’t track his movement so the tasks are mandatory. From my point of view, I’d rather have the user go 1-2 times through a longer flow and be able to successfully use the product rather than keeping it simple and confusing the user.

Important: Our users are of an older age demographic therefore everything must be as simple and clean as possible.

What would be the best approach to keep the process as short as possible while maintaining its usability? I haven’t seen any other application that has anything as complex as what I mentioned above.

*the LEDS task is tricky because it is not too visible on the sensor. Beside the phrasing “LEDS must face up” is confusing. Last but not least, our users may not even know what’s a “LED”.

## Should I use wizards steps if the user won’t finish all the steps at the same day?

I’m currently designing a system and there is this specific functionality that the user has to complete a series of steps, but the last step won’t be completed at the same day (it has a specific day to be completed). These previous steps are more like of a preparation to the last step itself.

Is it okay to use a linear wizard and let the user complete the last step later by saving its state or should I make this last step as a standalone page?

## Adding height to a minimum quantity of steps

I have a set of concrete steps. Each step has a height. I record the height of each stair, from first to last, bottom to top, as a list of heights: [0, 1.3, 2, 3.5, 4.2].

The difference in height between any two steps may not be the same. This is a tripping hazard. I wish to adjust the steps so that the height increase between any two steps is uniform, within an acceptable tolerance, q (example: 0.2).

Adding concrete is time-consuming on a per-step basis, but concrete is cheap, so it doesn’t matter how much height I add to any one step, only how many steps I raise. I can’t subtract height from any steps, and I also can’t raise the last step, since that’s the landing.

What is the minimum number of steps that can be added to such that the height gain from any one step to the next is within the tolerance, q?

## How sufficient are these steps to prevent deleted SSD files from being recovered?

I’m selling a 4-year-old Dell PC with Windows 10 and two SSDs and I want to be sure that nobody can recover anything from my personal deleted files. So far I’ve done the following.

1. Completely Bitlocker encrypt both disks, including unused space. (Note the machine did not have TPM so I had to use a password)
2. Uninstalled software and deleted all personal files. (For sake of discussion, let’s assume I didn’t miss any personal files.)
3. Created a new, Administrator-level account
4. Logged on to the new account.
5. Completely deleted my previous user account.
6. Completely Bitlocker DE-crypted both disks again
7. Completely bitlocker encrypted and then decrypted both disks, yet again.

My idea was that if Bitlocker full-disk encryption/decryption really touches the whole disk, then two rounds of encrypt/decrypt out to overwrite everything. But I don’t know if I understandit correctly or even if SSDs truly work like HDDs in that regard

Is this good enough? Is there some other step I can take that doesn’t involve buying some expensive tool?

I can’t sell this encrypted and I want to leave Windows 10 on there so I didn’t want to completely reformat the system drive.