Define multimedia and application of multimedia, Computer Network Security

Assignment Help:

Describe the salient features of the multimedia. Also explain the applications of it.

Multimedia can be understood as follows:

Multimedia is on the whole a media which makes use of combination of various content forms like images video, , animation etc. Usually computerized and electronic devices utilize multimedia for the reason of recording and playing games, displaying at the accessing data. Multimedia is way different from fixed media, because the form or even involve the audio content. Multimedia can be classified into two major categories based on navigational control.

(i) Linear Multimedia is defined as follows:

 The content of this media does not need any navigation control for instance: cinema presentation.

(ii) Non-linear Multimedia is defined as follows:

The content of non-linear multimedia enables user interactivity due to which the user is sole responsible for controlling the progress of the content, for example: computer games, hypermedia. Salient features of Multimedia

a) Multimedia Presentation is defined as follows:

A   presentation   that   makes   use   of   multimedia   is   called   multimedia presentation, this presentation is considered as me of the significant feature of multimedia. These presentation can be delivered by a person live on the stage or by laying a recorded content in a media player or by projecting the content on a screen.

b) Digital on-line Multimedia is defined as follows:

The content of this media either be downloaded or streamed (streaming multimedia  can  either  be  live  or on  demand).  However  this  form  of on-line  multimedia  is transforming as object oriented and data driver. This transformation facilitates applications to support end user innovation and even enables personalization on different content forms.

c) Broadcast Multimedia is defined as follows:

This form of multimedia presentation can be live or recorded. These broadcasts and recordings is done by employing electronic media technology which can either be in digital or analog format multimedia games and simulations can be used globally in a network, locally on a desktop, game system or simulator and on physical environment quipped with special effects.

Applications of Multimedia is defined as follows:

include,

 There are many areas where multimedia is applicable. Some of these areas

 Entertainment Industry is defined as follows:

In current years, the massive use of multimedia in the entertainment industry is seen.  Multimedia  is  utilized  in  this  industry  for  playing  interactive  games  and  for developing/growing affirmation and special effects in the movie.

Commercial Purpose is defined as follows: 

In the industrial sector, use of multimedia is much useful in giving the information to stakeholders, workers    and co-workers and also in providing training to employees.

Education Purpose is defined as follows:

In the field of education the use of multimedia can be seen in development/growth of computer based training courses such as  encyclopedia and Almanaus.

Medicine Field is defined as follows:

Multimedia is made in use to develop a virtual surgery that helps the doctor’s o gédié insight view of human body and also to develop a presentation which shows the effects of viral and bacterial infections on the human body.

Mathematical Scientific Research is defined as follows:

Simulation .

 The most essential use of multimedia in this field is modelling and

 Document Imaging is defined as follows:

The multimedia is made in use for the conversion of hard copy image to digital image.

Additionally to the above fields, the most emerging application of multimedia is the virtual reality. Virtual reality is also called as artificial intelligence where in artificial environment (which appears real to the users) is created with the assistance of specialized software and hardware.

Multimedia can be made in use for innovative presentations for advertisements and by creating advanced multimedia presentations for selling the ideas and liven up training.


Related Discussions:- Define multimedia and application of multimedia

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Explain transposition ciphers and substitution cipher, What do you understa...

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Security analysis-information security, SECURITY ANALYSIS Overview •    ...

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Computer security, For this assessment, students must research and analyse ...

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

SNORT, Detect each visit to www.google.com that is made by the machine. o S...

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Public key cryptosystem based on rsa technology, Problem: (a) What is ...

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Explain what is software debouncing, Question : (a) How does a 2-key r...

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Firewall analysis tools-information security, FIREWALL ANALYSIS TOOLS Th...

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd