Define multimedia and application of multimedia, Computer Network Security

Assignment Help:

Describe the salient features of the multimedia. Also explain the applications of it.

Multimedia can be understood as follows:

Multimedia is on the whole a media which makes use of combination of various content forms like images video, , animation etc. Usually computerized and electronic devices utilize multimedia for the reason of recording and playing games, displaying at the accessing data. Multimedia is way different from fixed media, because the form or even involve the audio content. Multimedia can be classified into two major categories based on navigational control.

(i) Linear Multimedia is defined as follows:

 The content of this media does not need any navigation control for instance: cinema presentation.

(ii) Non-linear Multimedia is defined as follows:

The content of non-linear multimedia enables user interactivity due to which the user is sole responsible for controlling the progress of the content, for example: computer games, hypermedia. Salient features of Multimedia

a) Multimedia Presentation is defined as follows:

A   presentation   that   makes   use   of   multimedia   is   called   multimedia presentation, this presentation is considered as me of the significant feature of multimedia. These presentation can be delivered by a person live on the stage or by laying a recorded content in a media player or by projecting the content on a screen.

b) Digital on-line Multimedia is defined as follows:

The content of this media either be downloaded or streamed (streaming multimedia  can  either  be  live  or on  demand).  However  this  form  of on-line  multimedia  is transforming as object oriented and data driver. This transformation facilitates applications to support end user innovation and even enables personalization on different content forms.

c) Broadcast Multimedia is defined as follows:

This form of multimedia presentation can be live or recorded. These broadcasts and recordings is done by employing electronic media technology which can either be in digital or analog format multimedia games and simulations can be used globally in a network, locally on a desktop, game system or simulator and on physical environment quipped with special effects.

Applications of Multimedia is defined as follows:

include,

 There are many areas where multimedia is applicable. Some of these areas

 Entertainment Industry is defined as follows:

In current years, the massive use of multimedia in the entertainment industry is seen.  Multimedia  is  utilized  in  this  industry  for  playing  interactive  games  and  for developing/growing affirmation and special effects in the movie.

Commercial Purpose is defined as follows: 

In the industrial sector, use of multimedia is much useful in giving the information to stakeholders, workers    and co-workers and also in providing training to employees.

Education Purpose is defined as follows:

In the field of education the use of multimedia can be seen in development/growth of computer based training courses such as  encyclopedia and Almanaus.

Medicine Field is defined as follows:

Multimedia is made in use to develop a virtual surgery that helps the doctor’s o gédié insight view of human body and also to develop a presentation which shows the effects of viral and bacterial infections on the human body.

Mathematical Scientific Research is defined as follows:

Simulation .

 The most essential use of multimedia in this field is modelling and

 Document Imaging is defined as follows:

The multimedia is made in use for the conversion of hard copy image to digital image.

Additionally to the above fields, the most emerging application of multimedia is the virtual reality. Virtual reality is also called as artificial intelligence where in artificial environment (which appears real to the users) is created with the assistance of specialized software and hardware.

Multimedia can be made in use for innovative presentations for advertisements and by creating advanced multimedia presentations for selling the ideas and liven up training.


Related Discussions:- Define multimedia and application of multimedia

Access controls-information security, Access Controls Access controls ad...

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

The Security Systems Development Life Cycle (SecSDLCtle.., #Under what circ...

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

What you understand by the term brute force attack, Question: a) Expla...

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

Direct point-to-point communication:, Early networks used simple point-to...

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Describe how lower bounds on arc flows, QUESTION: (a) Suppose the graph ...

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Public key cryptography encryption, What do you understand by the term encr...

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd