Define multimedia and application of multimedia, Computer Network Security

Assignment Help:

Describe the salient features of the multimedia. Also explain the applications of it.

Multimedia can be understood as follows:

Multimedia is on the whole a media which makes use of combination of various content forms like images video, , animation etc. Usually computerized and electronic devices utilize multimedia for the reason of recording and playing games, displaying at the accessing data. Multimedia is way different from fixed media, because the form or even involve the audio content. Multimedia can be classified into two major categories based on navigational control.

(i) Linear Multimedia is defined as follows:

 The content of this media does not need any navigation control for instance: cinema presentation.

(ii) Non-linear Multimedia is defined as follows:

The content of non-linear multimedia enables user interactivity due to which the user is sole responsible for controlling the progress of the content, for example: computer games, hypermedia. Salient features of Multimedia

a) Multimedia Presentation is defined as follows:

A   presentation   that   makes   use   of   multimedia   is   called   multimedia presentation, this presentation is considered as me of the significant feature of multimedia. These presentation can be delivered by a person live on the stage or by laying a recorded content in a media player or by projecting the content on a screen.

b) Digital on-line Multimedia is defined as follows:

The content of this media either be downloaded or streamed (streaming multimedia  can  either  be  live  or on  demand).  However  this  form  of on-line  multimedia  is transforming as object oriented and data driver. This transformation facilitates applications to support end user innovation and even enables personalization on different content forms.

c) Broadcast Multimedia is defined as follows:

This form of multimedia presentation can be live or recorded. These broadcasts and recordings is done by employing electronic media technology which can either be in digital or analog format multimedia games and simulations can be used globally in a network, locally on a desktop, game system or simulator and on physical environment quipped with special effects.

Applications of Multimedia is defined as follows:

include,

 There are many areas where multimedia is applicable. Some of these areas

 Entertainment Industry is defined as follows:

In current years, the massive use of multimedia in the entertainment industry is seen.  Multimedia  is  utilized  in  this  industry  for  playing  interactive  games  and  for developing/growing affirmation and special effects in the movie.

Commercial Purpose is defined as follows: 

In the industrial sector, use of multimedia is much useful in giving the information to stakeholders, workers    and co-workers and also in providing training to employees.

Education Purpose is defined as follows:

In the field of education the use of multimedia can be seen in development/growth of computer based training courses such as  encyclopedia and Almanaus.

Medicine Field is defined as follows:

Multimedia is made in use to develop a virtual surgery that helps the doctor’s o gédié insight view of human body and also to develop a presentation which shows the effects of viral and bacterial infections on the human body.

Mathematical Scientific Research is defined as follows:

Simulation .

 The most essential use of multimedia in this field is modelling and

 Document Imaging is defined as follows:

The multimedia is made in use for the conversion of hard copy image to digital image.

Additionally to the above fields, the most emerging application of multimedia is the virtual reality. Virtual reality is also called as artificial intelligence where in artificial environment (which appears real to the users) is created with the assistance of specialized software and hardware.

Multimedia can be made in use for innovative presentations for advertisements and by creating advanced multimedia presentations for selling the ideas and liven up training.


Related Discussions:- Define multimedia and application of multimedia

CNSS, Assume that a security model is needed for the protection of informat...

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

Address resolution techniques, Address resolution algorithms may be grouped...

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

Hardware, Hardware, Software, and Network Asset Identification What info...

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Deploying host-based idss, Deploying Host-Based IDSs -Proper implementat...

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Base lining-risk management, Base lining •    Organizations do not have ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

What is data spoliation, QUESTION (a) What do you meant by data spoli...

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Different architectures for wireless networks, (a) What are the different a...

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Cryptography, hi have a look and tell me if u can do it. if u can do Q1then...

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

Selecting a risk control strategy-information security, Selecting a Risk Co...

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd