The Design Process Steps
Scenarios
Vocabulary
Scenarios 2
Bonus
100
What is the first step of the design process?
Identify the need or problem
100
Bill is doing the egg drop test. He creates a box full of feathers and puts the egg in the middle of the box. Other than gravity what is he most likely testing?
Whether or not the feathers will soften the drop
100
An original design that is built for testing is called a...
Prototype
100

You notice that your phone keeps slipping out of your pocket during workouts. You decide to design a new type of pocket. Which step of the EDP are you starting with?

What is identifying the problem?


100

To create strong and secure passwords, it is recommended to include these three types of characters.

What are letters, numbers, and special symbols?

200
If a prototype works perfectly the first time, which steps of the design process can be skipped?
4. Make improvements and 5. Retest
200
Lucy has tested and redesigned her model car and found that it works perfectly. What should she do next?
Communicate the results
200
When scientist share their results through talking or writing it is known as...
Communicating
200

You build a prototype of a chair that can fold into a backpack. Which step of the EDP are you demonstrating?

What is developing and testing a solution?

200

This action helps protect your accounts by requiring both a password and a secondary form of verification, like a code sent to your phone

What is enabling two-factor authentication?

300
What is the final step of the design process?
Create a finished product
300
Jim has created a prototype for a paper airplane. His design flies for a few moments before crashing. What should Jim's next step be?
Redesign
300
Creating an exact copy is called...
Duplicating
300

After testing your solar-powered toy car, you find it moves too slowly. You decide to add a stronger motor. What EDP step are you performing?

What is improving the design?


300

Clicking on suspicious links or opening unexpected attachments in emails can expose your device to this type of malicious software.

What is a virus or malware?

400
What are some ways to communicate results?
Talk with others, write down your results
400
After communicating the results of their experiment the researchers decide it is time to do what next?
Create a finished product
400
When engineers use their five senses to draw conclusions about something they are...
Observing
400

Your group compares designs to see which one is the most cost-effective and easiest to build. What EDP step is this?

What is selecting the best solution?

400

This term refers to limiting the personal information you share online to reduce risks like identity theft or cyberstalking.

What is practicing data privacy?

500
What step has two parts?
Step 2: Plan and build a solution
500
Betty needs to open her pop without spilling it. What step of the design process has she performed?
Identifying a need/problem
500
The field of study that uses the design process is called what?
Engineering
500

You research existing bridges to gather inspiration for creating a safer and stronger design. What EDP step does this represent?

What is conducting research?

500

This is the term for using technology to harass, embarrass, or harm someone repeatedly online.

What is cyberbullying?