SlideShare a Scribd company logo
1 of 2
Chapter 8: Digital Media
8.1 Learning Objective Checkpoints
2. Why are some digital audio files so huge?
Usually ithas to do with samplingratebecause ithas to do with sound quality.The better the sound quality,the
more spacethat is needed for it.
3. What is the difference between digital audio and MIDI?
Digital audio files contain digitized recordings of real performances,whileMIDIs contain instructionsfor creating
individual notes thatsound likevarious musical instruments.
5. How are images transferred from digital cameras to computers?
Card readers, directcabletransfer,infrared port, media transfers,dockingstations,or emails.Basically your
camera stores photos as bitmaps and bitmaps are produced by scanners and you can use them that way.
6. What affects the quality of a bitmap graphic and its suit-ability for Web pages, e-mail attachments, printed
photos, or desktop-published documents?
From what I could find on page 431,it said thatthe quality and suit-ability changes dependingon the use of the
bitmap.
7. Can compression play a role in reducing the size of graphic files?
Yes, however most graphic fileformats automatically compress files.You can do ityourself however. BMP files
shrink up to 70% whileimage files hardly shrink atall.
8. How do vector graphics differ from bitmaps?
They resize better, require less storagespace,not as realistic,and areeasier to edit.
9. Is it possible to convert vector graphics into bitmap graphics?
Yes, you can use itthrough a process called rasterization.
11. What affects the amount of video that can be stored on a hard disk or portable media player?
It is affected by the video format used on your camera. Video files produced from digital tapeusually arethe
largest,where videos stored on memory cards aresomewhat smaller and videos fromcell phones and webcams
are small enough to email.
12. How is digital video deployed on the Web?
They are embedded into the website.
15. How do digital rights management technologies restrict the ways in which I can use digital media?
They use a variety of technologies to do this.Authentication is a form of drm which allows contentto be accessed
only by authorized individuals.Copy rights arealso goingon which doesn’t allowvarious formats to existafter the
original format.Encryption also exists so thata filecan’t be viewed without a valid encryption key. Digital
watermarks areused so that the data can be tracked, identified and verified.
16. How are time shifting, place shifting, and format shifting related to digital media?
Time shiftingallowsa media to be recorded so that itcan be played back at a convenient time. Placeshifting
allows media started at one placeto be accessed from another placewithout changingthe device. Format shifting
is the process of converting media files fromone format to the other.
8.2 Beyond –the-Book Exercise
In this BTB exercise, you will be researching the concept of image propertiesand what theymean to the
field of digital forensics.
For this exercise download the following image located at the following link:
http://users.marshall.edu/~brunty11/geotag.jpg
Open the image using any available graphics software (or view the image properties In Windows). Use
this software to discover the properties (a.k.a. metadata) of the graphic. Indicate the source of the
graphic, then describe the its file format, file size, resolution, physical size, geolocation data, and what
camera it might have been taken from.
Source:Everyone (?)
File format: JPEG image
File size:1.48 MB (1,554,865 bytes)
Resolution:72dpi
Physical size:1936 x 2542
Geolocationdata:38;24;41.39 and 82;25;53.402
Camera:Apple IPhone 4

More Related Content

Similar to Ist264 sowards h_chapter8labjournal

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2
Mehdi zizi
 
Video Stitching + AI ML- Changing Landscape over the years
Video Stitching + AI ML- Changing Landscape over the yearsVideo Stitching + AI ML- Changing Landscape over the years
Video Stitching + AI ML- Changing Landscape over the years
Logic Fruit Technologies
 

Similar to Ist264 sowards h_chapter8labjournal (20)

Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Image Security Case Study
Image Security Case StudyImage Security Case Study
Image Security Case Study
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
50120130406038
5012013040603850120130406038
50120130406038
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Emerging trends in social media marketing
Emerging trends in social media marketingEmerging trends in social media marketing
Emerging trends in social media marketing
 
Chapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.pptChapter 1-Introduction to Media-Past, Present and Future.ppt
Chapter 1-Introduction to Media-Past, Present and Future.ppt
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
Multimedia and ICT
Multimedia and ICTMultimedia and ICT
Multimedia and ICT
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Imagically Image Forensic Tool
Imagically Image Forensic ToolImagically Image Forensic Tool
Imagically Image Forensic Tool
 
Video Stitching + AI ML- Changing Landscape over the years
Video Stitching + AI ML- Changing Landscape over the yearsVideo Stitching + AI ML- Changing Landscape over the years
Video Stitching + AI ML- Changing Landscape over the years
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
M.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit vM.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit v
 

More from Harold Sowards (20)

Dive heart project
Dive heart projectDive heart project
Dive heart project
 
Pseudo family violence
Pseudo family violencePseudo family violence
Pseudo family violence
 
Pseudofamilyviolence sowards
Pseudofamilyviolence sowardsPseudofamilyviolence sowards
Pseudofamilyviolence sowards
 
Sowards 440exam
Sowards 440examSowards 440exam
Sowards 440exam
 
Rape review
Rape reviewRape review
Rape review
 
Movie review
Movie reviewMovie review
Movie review
 
Line of duty review
Line of duty reviewLine of duty review
Line of duty review
 
Us v. maze
Us v. mazeUs v. maze
Us v. maze
 
Us v. garcia
Us v. garciaUs v. garcia
Us v. garcia
 
Us v. ancheta
Us v. anchetaUs v. ancheta
Us v. ancheta
 
State v. zeta chi fraternity
State v. zeta chi fraternityState v. zeta chi fraternity
State v. zeta chi fraternity
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
 
State v. tomaino
State v. tomainoState v. tomaino
State v. tomaino
 
State v. stark
State v. starkState v. stark
State v. stark
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
 
State v. sexton
State v. sextonState v. sexton
State v. sexton
 
State v. schleifer
State v. schleiferState v. schleifer
State v. schleifer
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
 
State v. metzger
State v. metzgerState v. metzger
State v. metzger
 
State v. mays
State v. maysState v. mays
State v. mays
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Ist264 sowards h_chapter8labjournal

  • 1. Chapter 8: Digital Media 8.1 Learning Objective Checkpoints 2. Why are some digital audio files so huge? Usually ithas to do with samplingratebecause ithas to do with sound quality.The better the sound quality,the more spacethat is needed for it. 3. What is the difference between digital audio and MIDI? Digital audio files contain digitized recordings of real performances,whileMIDIs contain instructionsfor creating individual notes thatsound likevarious musical instruments. 5. How are images transferred from digital cameras to computers? Card readers, directcabletransfer,infrared port, media transfers,dockingstations,or emails.Basically your camera stores photos as bitmaps and bitmaps are produced by scanners and you can use them that way. 6. What affects the quality of a bitmap graphic and its suit-ability for Web pages, e-mail attachments, printed photos, or desktop-published documents? From what I could find on page 431,it said thatthe quality and suit-ability changes dependingon the use of the bitmap. 7. Can compression play a role in reducing the size of graphic files? Yes, however most graphic fileformats automatically compress files.You can do ityourself however. BMP files shrink up to 70% whileimage files hardly shrink atall. 8. How do vector graphics differ from bitmaps? They resize better, require less storagespace,not as realistic,and areeasier to edit. 9. Is it possible to convert vector graphics into bitmap graphics? Yes, you can use itthrough a process called rasterization. 11. What affects the amount of video that can be stored on a hard disk or portable media player? It is affected by the video format used on your camera. Video files produced from digital tapeusually arethe largest,where videos stored on memory cards aresomewhat smaller and videos fromcell phones and webcams are small enough to email. 12. How is digital video deployed on the Web? They are embedded into the website. 15. How do digital rights management technologies restrict the ways in which I can use digital media? They use a variety of technologies to do this.Authentication is a form of drm which allows contentto be accessed only by authorized individuals.Copy rights arealso goingon which doesn’t allowvarious formats to existafter the original format.Encryption also exists so thata filecan’t be viewed without a valid encryption key. Digital watermarks areused so that the data can be tracked, identified and verified. 16. How are time shifting, place shifting, and format shifting related to digital media?
  • 2. Time shiftingallowsa media to be recorded so that itcan be played back at a convenient time. Placeshifting allows media started at one placeto be accessed from another placewithout changingthe device. Format shifting is the process of converting media files fromone format to the other. 8.2 Beyond –the-Book Exercise In this BTB exercise, you will be researching the concept of image propertiesand what theymean to the field of digital forensics. For this exercise download the following image located at the following link: http://users.marshall.edu/~brunty11/geotag.jpg Open the image using any available graphics software (or view the image properties In Windows). Use this software to discover the properties (a.k.a. metadata) of the graphic. Indicate the source of the graphic, then describe the its file format, file size, resolution, physical size, geolocation data, and what camera it might have been taken from. Source:Everyone (?) File format: JPEG image File size:1.48 MB (1,554,865 bytes) Resolution:72dpi Physical size:1936 x 2542 Geolocationdata:38;24;41.39 and 82;25;53.402 Camera:Apple IPhone 4