Define multimedia and application of multimedia, Computer Network Security

Describe the salient features of the multimedia. Also explain the applications of it.

Multimedia can be understood as follows:

Multimedia is on the whole a media which makes use of combination of various content forms like images video, , animation etc. Usually computerized and electronic devices utilize multimedia for the reason of recording and playing games, displaying at the accessing data. Multimedia is way different from fixed media, because the form or even involve the audio content. Multimedia can be classified into two major categories based on navigational control.

(i) Linear Multimedia is defined as follows:

 The content of this media does not need any navigation control for instance: cinema presentation.

(ii) Non-linear Multimedia is defined as follows:

The content of non-linear multimedia enables user interactivity due to which the user is sole responsible for controlling the progress of the content, for example: computer games, hypermedia. Salient features of Multimedia

a) Multimedia Presentation is defined as follows:

A   presentation   that   makes   use   of   multimedia   is   called   multimedia presentation, this presentation is considered as me of the significant feature of multimedia. These presentation can be delivered by a person live on the stage or by laying a recorded content in a media player or by projecting the content on a screen.

b) Digital on-line Multimedia is defined as follows:

The content of this media either be downloaded or streamed (streaming multimedia  can  either  be  live  or on  demand).  However  this  form  of on-line  multimedia  is transforming as object oriented and data driver. This transformation facilitates applications to support end user innovation and even enables personalization on different content forms.

c) Broadcast Multimedia is defined as follows:

This form of multimedia presentation can be live or recorded. These broadcasts and recordings is done by employing electronic media technology which can either be in digital or analog format multimedia games and simulations can be used globally in a network, locally on a desktop, game system or simulator and on physical environment quipped with special effects.

Applications of Multimedia is defined as follows:

include,

 There are many areas where multimedia is applicable. Some of these areas

 Entertainment Industry is defined as follows:

In current years, the massive use of multimedia in the entertainment industry is seen.  Multimedia  is  utilized  in  this  industry  for  playing  interactive  games  and  for developing/growing affirmation and special effects in the movie.

Commercial Purpose is defined as follows: 

In the industrial sector, use of multimedia is much useful in giving the information to stakeholders, workers    and co-workers and also in providing training to employees.

Education Purpose is defined as follows:

In the field of education the use of multimedia can be seen in development/growth of computer based training courses such as  encyclopedia and Almanaus.

Medicine Field is defined as follows:

Multimedia is made in use to develop a virtual surgery that helps the doctor’s o gédié insight view of human body and also to develop a presentation which shows the effects of viral and bacterial infections on the human body.

Mathematical Scientific Research is defined as follows:

Simulation .

 The most essential use of multimedia in this field is modelling and

 Document Imaging is defined as follows:

The multimedia is made in use for the conversion of hard copy image to digital image.

Additionally to the above fields, the most emerging application of multimedia is the virtual reality. Virtual reality is also called as artificial intelligence where in artificial environment (which appears real to the users) is created with the assistance of specialized software and hardware.

Multimedia can be made in use for innovative presentations for advertisements and by creating advanced multimedia presentations for selling the ideas and liven up training.

Posted Date: 7/20/2012 6:29:42 AM | Location : United States







Related Discussions:- Define multimedia and application of multimedia, Assignment Help, Ask Question on Define multimedia and application of multimedia, Get Answer, Expert's Help, Define multimedia and application of multimedia Discussions

Write discussion on Define multimedia and application of multimedia
Your posts are moderated
Related Questions
Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should