Define multimedia and application of multimedia, Computer Network Security

Describe the salient features of the multimedia. Also explain the applications of it.

Multimedia can be understood as follows:

Multimedia is on the whole a media which makes use of combination of various content forms like images video, , animation etc. Usually computerized and electronic devices utilize multimedia for the reason of recording and playing games, displaying at the accessing data. Multimedia is way different from fixed media, because the form or even involve the audio content. Multimedia can be classified into two major categories based on navigational control.

(i) Linear Multimedia is defined as follows:

 The content of this media does not need any navigation control for instance: cinema presentation.

(ii) Non-linear Multimedia is defined as follows:

The content of non-linear multimedia enables user interactivity due to which the user is sole responsible for controlling the progress of the content, for example: computer games, hypermedia. Salient features of Multimedia

a) Multimedia Presentation is defined as follows:

A   presentation   that   makes   use   of   multimedia   is   called   multimedia presentation, this presentation is considered as me of the significant feature of multimedia. These presentation can be delivered by a person live on the stage or by laying a recorded content in a media player or by projecting the content on a screen.

b) Digital on-line Multimedia is defined as follows:

The content of this media either be downloaded or streamed (streaming multimedia  can  either  be  live  or on  demand).  However  this  form  of on-line  multimedia  is transforming as object oriented and data driver. This transformation facilitates applications to support end user innovation and even enables personalization on different content forms.

c) Broadcast Multimedia is defined as follows:

This form of multimedia presentation can be live or recorded. These broadcasts and recordings is done by employing electronic media technology which can either be in digital or analog format multimedia games and simulations can be used globally in a network, locally on a desktop, game system or simulator and on physical environment quipped with special effects.

Applications of Multimedia is defined as follows:


 There are many areas where multimedia is applicable. Some of these areas

 Entertainment Industry is defined as follows:

In current years, the massive use of multimedia in the entertainment industry is seen.  Multimedia  is  utilized  in  this  industry  for  playing  interactive  games  and  for developing/growing affirmation and special effects in the movie.

Commercial Purpose is defined as follows: 

In the industrial sector, use of multimedia is much useful in giving the information to stakeholders, workers    and co-workers and also in providing training to employees.

Education Purpose is defined as follows:

In the field of education the use of multimedia can be seen in development/growth of computer based training courses such as  encyclopedia and Almanaus.

Medicine Field is defined as follows:

Multimedia is made in use to develop a virtual surgery that helps the doctor’s o gédié insight view of human body and also to develop a presentation which shows the effects of viral and bacterial infections on the human body.

Mathematical Scientific Research is defined as follows:

Simulation .

 The most essential use of multimedia in this field is modelling and

 Document Imaging is defined as follows:

The multimedia is made in use for the conversion of hard copy image to digital image.

Additionally to the above fields, the most emerging application of multimedia is the virtual reality. Virtual reality is also called as artificial intelligence where in artificial environment (which appears real to the users) is created with the assistance of specialized software and hardware.

Multimedia can be made in use for innovative presentations for advertisements and by creating advanced multimedia presentations for selling the ideas and liven up training.

Posted Date: 7/20/2012 6:29:42 AM | Location : United States

Related Discussions:- Define multimedia and application of multimedia, Assignment Help, Ask Question on Define multimedia and application of multimedia, Get Answer, Expert's Help, Define multimedia and application of multimedia Discussions

Write discussion on Define multimedia and application of multimedia
Your posts are moderated
Related Questions
(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (