Multimedia can be difficult to view on a mobile device

Assignment Help Basic Computer Science
Reference no: EM13732616

1. Some multimedia can be difficult to view on a mobile device due to screen size or bandwidth limitations. Find two articles that discuss considerations and new developments that will enable multimedia on a site to be viewed effectively on a mobile device. What advice would you give a site designer considering what multimedia elements to use and how to prioritize them? Be specific, including size limitations or tools to use. 
2. Find two blogs that discuss Web site design trends. On each site, find blog entries on a specific interactive feature, such as comments or gadgets. On each of the two design trends blogs, read a few entries on the subject to get information about current trends. Evaluate the blogs' interactive and site features, such as comments and multimedia. Write a report for your instructor critiquing the blogs' interactive features. List three things that you learned from the blog's content. What does each blog do well? What changes might you make to the layout or features? Evaluate each blog as a source of information. 
3. Research the latest digital camera specifications for mobile devices. Compare the highest-quality mobile device cameras to digital cameras available on the market. Choose one mobile device that has a scanner and answer the following questions: How would you transfer the images to a computer that has image- editing software? How can you make choices such as resolution, zoom, and more with the camera? Would the digital camera be sufficient to create Web-ready images? How? 
4. Cascading Style Sheets (CSS), a multi-featured specification for HTML, offers designers an expedient, powerful method to control the formatting and layout of Web pages. Research the current level of support for style sheets by leading browsers and the current W3C recommendations for style sheet usage. Create a report summarizing your research. Explain why you will or will not use Cascading Style Sheets to design your Web site. 
5. Research the latest developments in accessibility standards. Make a list of five important accessibility considerations, and note whether they are new or existing issues. Visit two sites to see if these sites meet the considerations. Summarize your findings. 
6. How do social networking and bookmarking sites affect Internet users' personal interactions with the Internet? As a Web designer, how can you take advantage of these trends? Visit at least one social networking and social bookmarking site to see how users share information. Identify at least one site that encourages and provides opportunities for users to share content using these technologies. 

Reference no: EM13732616

Questions Cloud

Improvement to a product or service on the market : You can make a major modification / improvement to a product/service on the market or create your own product/service
Systems consideration in hris : Write a three to four (5 - 6) page paper in which you thoroughly answer the following questions;
Strategic objectives for your new division : Develop the strategic objectives for your new division of the existing business in a balanced scorecard format in the context of key trends, assumptions, and risks. The strategic objectives are measures of attaining your vision and mission. As you..
Process based standard of security model for many organizati : ISO 17799 is a well-known and accepted process based standard of security model for many organizations. In his ISO 17799 article, Siponen argues that standards need to better focus on the process and the quality of the process. Can the ISO model be i..
Multimedia can be difficult to view on a mobile device : Some multimedia can be difficult to view on a mobile device due to screen size or bandwidth limitations. Find two articles that discuss considerations and new developments that will enable multimedia on a site to be viewed effectively on a mobile dev..
List and describe the four main types of vmkernel services : In a Word document, explain the following topics.• List and describe the four main types of VMkernel services that require the use of VMkernel port.• List and detail the five capabilities that both vSS and vDS share in common.
Design a 3-bit counter, which can count either up or down : Design a 3-bit counter, which can count either up or down. The input has a clock, and a signal U. When U = 1, the counter counts up; when U = 0, the counter counts down. For example, assume the current counter Q(t) = 011. If U(t) = 0, then Q(t+1) = 0..
Potential negative aspects of promoting employees : Hiring and promoting from within is often seen as a positive motivational tool. It can be argued that there is a negative side to this practice. Outline five potential negative aspects of promoting employees from within an organization. Be sure to..
Keeping the focus on national security concerns : How should government justify telling private industry how to set up or improve their cybersecurity?• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against gov..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Electronic communications privacy act ecpa

Electronic Communications Privacy Act (ECPA)

  Create an array of five shippedorder objects

Create 4 Order class fields: order number, customer name, quantity ordered, and total price. Create public accessors for each field except total price.

  Write a simplified version of sort called my-sort-1

Write a simplified version of sort called my-sort-1 that reads from standard input, sorts lexicographically, and writes the output to standard output.

  What are control and what are containers

What are the various component use to build Graphic User Interface(GUI) screen? What are control and what are containers

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

  Determine physical address that code byte fetched

Suppose the same code segment base what physical address will code byte be fetched from if instruction pointer contains 539CH?

  Write a xml schema for the validation of the document notes

write a XML schema for the validation of the document notes.xml

  These function prototypes lack parameters

These function prototypes lack parameters; add whatever parameters you feel are necessary so that the program works without global variables. The program's output should reflect the bus's actions by reporting each change in state, along with the n..

  How does inheritance promote code reuse

In C++, how does inheritance promote code reuse

  What are some technologies and solutions

What are some technologies and solutions that can be used to reduce risk for the "Cloud" or "Cloud Data"

  An adt called squarematrix

An ADT called SquareMatrix

  Research details of ad of current web site or magazine

Pick a current web site or magazine ad for a complete, working computer system, including computer, monitor, keyboard, and software, together with extra devices such as a mouse or printer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd