SlideShare a Scribd company logo
1 of 2
Download to read offline
TECHNOLOGY                                                                          ENTER MONTH/YEAR




 COMPRESSION



 Compression can be either lossy or lossless.
 Lossless compression reduces bits by identifying
 and eliminating statistical redundancy. No
 information is lost in lossless compression. Lossy
 compression reduces bits by identifying marginally
 important information and removing it. The process
 of reducing the size of a data file is popularly
 referred to as data compression, although it’s
 formal name is source coding.

                                                        QUICKTIME PLAYER LOGO




                                                      STREAMING METHODS


                                                      Downloading
                                                      In computer networks, to download means to
 DIGTAL FILE FORMATS
                                                      receive data to a local system from a remote
                                                      system or to initiate such a data transfer. Examples
 .mpg / .mp4 / .mov / .avi / .wmv / .flv
                                                      of a remote system from which a download might
 The one we will be using is .mov .It is a computer   be performed include a web server, FTP server,
 file format used natively by the QuickTime           email server, or other similar systems.
 framework.
                                                      Up loading
                                                      Up loading is where you upload file and media to
                                                      the internet for other users to download and / or
                                                      view the data it used in YouTube as most content is
                                                      user generated.
                                                      Streaming
                                                      Streaming is where you have live content being
                                                      broadcast live to the internet you can do with such
                                                      websites such as YouTube.
TECHNOLOGY 2                                                            ENTER MONTH/YEAR




   FILE SIZE
   1 BYTE = 8 BITS
   1 KIB = 1,024 BYTES
   1 MIB = 1,048,576 BYTES
   1 GIB = 1,073,741,824 BYTES
   1 TIB = 1,099,511,627,776 BYTES




Digital rights management (drm) is a class of access control
technologies that are used by hardware manufacturers,
publishers, copyright holders and individuals with the intent
to limit the use of digital content and devices after sale.
DRM is any technology that inhibits uses of digital content
that are not desired or intended by the content provider.
                                                                .
(DRM) also includes specific instances of digital works or
devices.
                                                                    A USB MEMORY STICK

Media player is a term typically used to describe
computer software for playing back multimedia
files. While many media players can play both
audio and video, others focus only on one media
type or the other. These players are known as
either audio players or video players and often
have a user interface tailored for the specific
media type.




                                                                    CAPTION YOUR PHOTO HERE

More Related Content

What's hot

X2x pitch deck
X2x pitch deckX2x pitch deck
X2x pitch deckx2xproject
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
X2x pitch deck
X2x pitch deckX2x pitch deck
X2x pitch deckx2xproject
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Edtech101report
Edtech101reportEdtech101report
Edtech101reporterwinmate
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internetxtin101
 
CoPILOT in Cardiff - Jorum slides
CoPILOT in Cardiff - Jorum slidesCoPILOT in Cardiff - Jorum slides
CoPILOT in Cardiff - Jorum slidesUKCoPILOT
 

What's hot (9)

X2x pitch deck
X2x pitch deckX2x pitch deck
X2x pitch deck
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
X2x pitch deck
X2x pitch deckX2x pitch deck
X2x pitch deck
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Edtech101report
Edtech101reportEdtech101report
Edtech101report
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
P2PFile
P2PFileP2PFile
P2PFile
 
CoPILOT in Cardiff - Jorum slides
CoPILOT in Cardiff - Jorum slidesCoPILOT in Cardiff - Jorum slides
CoPILOT in Cardiff - Jorum slides
 

Viewers also liked

Viewers also liked (8)

5a lectura de llengua castellana
5a lectura de llengua castellana5a lectura de llengua castellana
5a lectura de llengua castellana
 
Conservaciones
ConservacionesConservaciones
Conservaciones
 
Presentacion
PresentacionPresentacion
Presentacion
 
Natural Mood Stabilizers
Natural Mood StabilizersNatural Mood Stabilizers
Natural Mood Stabilizers
 
Elizabeth marin saavedra
Elizabeth marin saavedraElizabeth marin saavedra
Elizabeth marin saavedra
 
Diversity in schools curriculum
Diversity in schools curriculumDiversity in schools curriculum
Diversity in schools curriculum
 
Ocean Engineering Graduate Brochure
Ocean Engineering Graduate BrochureOcean Engineering Graduate Brochure
Ocean Engineering Graduate Brochure
 
Raluca Diana Papuc Reference 2
Raluca Diana Papuc Reference 2Raluca Diana Papuc Reference 2
Raluca Diana Papuc Reference 2
 

Similar to Techology2

Ravi ubana presentation on cloud
Ravi ubana presentation on cloudRavi ubana presentation on cloud
Ravi ubana presentation on cloudRavi Ubana
 
Ist264 sowards h_chapter8labjournal
Ist264 sowards h_chapter8labjournalIst264 sowards h_chapter8labjournal
Ist264 sowards h_chapter8labjournalHarold Sowards
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatLeaMayMuozGaurino
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating systemMuhammadRobeel3
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2Mehdi zizi
 
could computing back story
could computing back storycould computing back story
could computing back storyansar ahmed
 
Conquest for dummies: how to setup a pacs server
Conquest for dummies: how to setup a pacs serverConquest for dummies: how to setup a pacs server
Conquest for dummies: how to setup a pacs serverBogazici University
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Ijarcet vol-2-issue-2-383-386
Ijarcet vol-2-issue-2-383-386Ijarcet vol-2-issue-2-383-386
Ijarcet vol-2-issue-2-383-386Editor IJARCET
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...PriyaU5
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vidpringles77
 

Similar to Techology2 (20)

File Sharing
File SharingFile Sharing
File Sharing
 
Ravi ubana presentation on cloud
Ravi ubana presentation on cloudRavi ubana presentation on cloud
Ravi ubana presentation on cloud
 
Ist264 sowards h_chapter8labjournal
Ist264 sowards h_chapter8labjournalIst264 sowards h_chapter8labjournal
Ist264 sowards h_chapter8labjournal
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstat
 
Ch # 07 operating system
Ch # 07 operating systemCh # 07 operating system
Ch # 07 operating system
 
MTP & PTP
MTP & PTPMTP & PTP
MTP & PTP
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2
 
could computing back story
could computing back storycould computing back story
could computing back story
 
Conquest for dummies: how to setup a pacs server
Conquest for dummies: how to setup a pacs serverConquest for dummies: how to setup a pacs server
Conquest for dummies: how to setup a pacs server
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Ijarcet vol-2-issue-2-383-386
Ijarcet vol-2-issue-2-383-386Ijarcet vol-2-issue-2-383-386
Ijarcet vol-2-issue-2-383-386
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 

More from coackleyr

Post production techniques
Post production techniquesPost production techniques
Post production techniquescoackleyr
 
Project schedule
Project scheduleProject schedule
Project schedulecoackleyr
 
Safety risk assessment form
Safety risk assessment formSafety risk assessment form
Safety risk assessment formcoackleyr
 
Legal and ethical cosiderations (d)
Legal and ethical cosiderations (d)Legal and ethical cosiderations (d)
Legal and ethical cosiderations (d)coackleyr
 
Legal issues 4a
Legal issues 4aLegal issues 4a
Legal issues 4acoackleyr
 
Assets table
Assets tableAssets table
Assets tablecoackleyr
 
Assets table
Assets tableAssets table
Assets tablecoackleyr
 
Advert research
Advert researchAdvert research
Advert researchcoackleyr
 
Formal specification
Formal specificationFormal specification
Formal specificationcoackleyr
 
Preproduction planning
Preproduction planningPreproduction planning
Preproduction planningcoackleyr
 
Meeting report
Meeting reportMeeting report
Meeting reportcoackleyr
 
Fizzy drinks inc production
Fizzy drinks inc productionFizzy drinks inc production
Fizzy drinks inc productioncoackleyr
 
Advert budget
Advert budgetAdvert budget
Advert budgetcoackleyr
 
Fizzy drinks inc
Fizzy drinks incFizzy drinks inc
Fizzy drinks inccoackleyr
 
Btec u62 and 1 ass 1
Btec u62 and 1 ass 1Btec u62 and 1 ass 1
Btec u62 and 1 ass 1coackleyr
 

More from coackleyr (20)

Evaluation
EvaluationEvaluation
Evaluation
 
Post production techniques
Post production techniquesPost production techniques
Post production techniques
 
Gantt chart
Gantt chartGantt chart
Gantt chart
 
Project schedule
Project scheduleProject schedule
Project schedule
 
Safety risk assessment form
Safety risk assessment formSafety risk assessment form
Safety risk assessment form
 
Shot log
Shot logShot log
Shot log
 
Legal and ethical cosiderations (d)
Legal and ethical cosiderations (d)Legal and ethical cosiderations (d)
Legal and ethical cosiderations (d)
 
Legal issues 4a
Legal issues 4aLegal issues 4a
Legal issues 4a
 
Assets table
Assets tableAssets table
Assets table
 
Assets table
Assets tableAssets table
Assets table
 
Advert research
Advert researchAdvert research
Advert research
 
Formal specification
Formal specificationFormal specification
Formal specification
 
Newsletter
NewsletterNewsletter
Newsletter
 
Preproduction planning
Preproduction planningPreproduction planning
Preproduction planning
 
Meeting report
Meeting reportMeeting report
Meeting report
 
Fizzy drinks inc production
Fizzy drinks inc productionFizzy drinks inc production
Fizzy drinks inc production
 
Advert budget
Advert budgetAdvert budget
Advert budget
 
Fizzy drinks inc
Fizzy drinks incFizzy drinks inc
Fizzy drinks inc
 
Techology2
Techology2Techology2
Techology2
 
Btec u62 and 1 ass 1
Btec u62 and 1 ass 1Btec u62 and 1 ass 1
Btec u62 and 1 ass 1
 

Techology2

  • 1. TECHNOLOGY ENTER MONTH/YEAR COMPRESSION Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying marginally important information and removing it. The process of reducing the size of a data file is popularly referred to as data compression, although it’s formal name is source coding. QUICKTIME PLAYER LOGO STREAMING METHODS Downloading In computer networks, to download means to DIGTAL FILE FORMATS receive data to a local system from a remote system or to initiate such a data transfer. Examples .mpg / .mp4 / .mov / .avi / .wmv / .flv of a remote system from which a download might The one we will be using is .mov .It is a computer be performed include a web server, FTP server, file format used natively by the QuickTime email server, or other similar systems. framework. Up loading Up loading is where you upload file and media to the internet for other users to download and / or view the data it used in YouTube as most content is user generated. Streaming Streaming is where you have live content being broadcast live to the internet you can do with such websites such as YouTube.
  • 2. TECHNOLOGY 2 ENTER MONTH/YEAR FILE SIZE 1 BYTE = 8 BITS 1 KIB = 1,024 BYTES 1 MIB = 1,048,576 BYTES 1 GIB = 1,073,741,824 BYTES 1 TIB = 1,099,511,627,776 BYTES Digital rights management (drm) is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that are not desired or intended by the content provider. . (DRM) also includes specific instances of digital works or devices. A USB MEMORY STICK Media player is a term typically used to describe computer software for playing back multimedia files. While many media players can play both audio and video, others focus only on one media type or the other. These players are known as either audio players or video players and often have a user interface tailored for the specific media type. CAPTION YOUR PHOTO HERE