SlideShare a Scribd company logo
LECTURE 4

THE USES OF TEXT IN MULTIMEDIA

          Prepared by
       Razia Nisar Noorani


                                 1
Objective
   Media Types
   What text is
   How text is created and stored in the
    computer
   How text is used in Multimedia Systems
   Advantages and Disadvantages
    of using texts




                                             2
Temporal & Non Temporal Media
    Media
   Refer to Multimedia elements.
   Two Media types:Temporal and Non-Temporal

    Temporal Media
   The media has an associated time aspect. Example: its
    view changes with respect to time.
   Examples: Audio, video, animation, music etc.




                                                            3
Temporal & Non Temporal Media
Non-Temporal Media
 Also known as a static media. It has the same

  representation regardless of time
 Examples: texts, graphics, paintings, book etc




   Multimedia applications are typically composed of both
    media




                                                             4
What is Text
   Basic media for many multimedia systems

   Texts in the form of words, sentences and paragraphs is
    used to communicate thoughts, ideas and facts in nearly
    every aspect of our lives.

   Multimedia products depends on text for many things:
    - to explain how the application work
    - to guide the user in navigating through the application
    - deliver the information for which the application was
      designed

                                                                5
What is Text
   Minimize the texts in multimedia application
   Texts consists of two structures:
       Linear
       Non-Linear




                                                   6
Text Technology
   Based on creating letters, numbers and special
    characters.

   Text elements can be categories into:
      Alphabet characters : A - Z

      Numbers : 0 - 9

      Special characters : Punctuation [. , ; ‘ …] , Sign or

       Symbols [* & ^ % $ £ ! / ~ # @ .…]
      Also known Character Sets




   May also include special icon or drawing symbols,
    mathematical symbols, Greek Letter etc.
                                                                7
Typefaces, Fonts and Points
Typefaces
 The graphic representations of the alphabet, numbers and

  special character.
 Usually vary by type sizes and styles.




Fonts
 Particular size of typefaces

 Usually vary by type sizes and styles.

 The sizes are measured in points

   - One point is 1/72” or 0.0138 inc”
   - Measuring distance from the top of a capital letters (e.g. ‘A or P’) to the
     bottom of a descenders (e.g. ‘y , ‘p’ , ‘q’).


                                                                                   8
Fonts Effects
   A numbers of effects that are useful for bringing viewer’s
    attention to content:

       Case: UPPER and lower letter
       Bold, Italic, Underline, superscript or subscript
       Embossed or Shadow
       Colours
       Strikethrough
        b




                                                                 9
Types of Fonts
   Two classes of fonts: Serif or Sans Serif

   Serif fonts use decorative tips or flags at the ends of a
    letter strokes

   Sans Serif fonts don’t have these features

   Serif fonts are usually used for documents or screens
    that have large quantities of text
     - This is because the serif helps guide the reader’s eye
        along the text
                                                                10
Types of Fonts
   For computer displays, Sans Serif fonts considered
    better because of the sharper contrast.

                                  Examples of San Serif fonts

        Times New Roman              Century Gothic
        Bookman                      Arial
        Rockwell Light               Comic Sans MS
        Courier New                  Impact
        Century                      Tahoma

        Examples of Serif fonts

                                                                11
Text Characteristics
        This example shows the Times New Roman font

                                                 Ascender
   Capital Height            x-Height




FD xhp
Point size        Serif        p -Height
                                            Descender
                                                            12
Tracking, Kerning and Leading




Av
 Unkerned
                   AvKerned
                                13
Tracking, Kerning and Leading

                       Reading Line One
      Leading
                       Reading Line One
   Ascender    : an upstroke on a character
   Descender   : the down stroke below the baseline of a character
   Leading     : spacing above and below a font or Line spacing
   Tracking    : spacing between characters
   Kerning     : space between pairs of characters, usually as an overlap
                 for improvement appearance


                                                                             14
Bitmapped and vector fonts
   Fonts can either be stored as bitmapped or vector
    graphics

   Bitmaps font depend to the size and the pixel numbers
    - File size increases as more sizes are added

   Vector fonts can draw any size by scaling the vector
    drawing primitives mathematically
     - File size is much smaller than bitmaps
     - TrueType and PostScript are vector font formats


                                                            15
Bitmapped and vector fonts




A bitmapped font   A vector font
                                   16
Jaggies and Antialiasing
   Jaggies are the jagged edges you see when a
    bitmapped image is resized

   It is a consequence of the underlying array of pixels from
    which the image is composed

   Antialiasing is a technique that can be used to eliminate
    jagged edges

   It substitutes additional pixels in other colours to fool the
    brain into thinking it is seeing continuous lines
                                                                    17
Jaggies and Antialiasing
   The technique is used to blend the font into the
    background by transitioning the colour from the font
    colour to background.

   This technique minimizes the jagged edges making for a
    smoother overall appearance.




                                                             18
Jaggies and Antialiasing




                           19
Text Data Files
   The common data encoding schemes for text are:

   Plain text (ASCII) is text in an electronic format that can
    be read and interpreted by humans

   Rich text is similar but it also embeds special control
    characters into the text to provide additional features

   Hypertext is an advance on rich text which allows the
    reader to jump to different sections within the document
    or even jump to a new document
                                                                  20
Text Data Files
Plain text
This is plain text. It is readable by humans. It can contains numbers
(01234) and punctuation (.,#@*&) since it uses the ASCII character set.

Rich text
This is <bold>rich text</bold>.<br><center>It is also readable by
humans but contains additional tags which control the presentation of
the text.</center>

Hypertext
This is <a href=“http://www.w3c.org/”>hypertext</a>. It uses the rich
text format shown above but adds the ability to hyperlink to other
documents.<hr><img src=“logo.gif”>
                                                                          21
Working With Text
   Considerations and guidelines when we are working with
    text:

       Be Concise
       Use the appropriate typefaces and fonts
       Make it readable
       Consider type styles and colors
       Use restraint and be consistent




                                                             22
How text can be used effectively
   Communicating Data
    - Customer names and address
    - Pricing information of products

   Explaining concepts and ideas
    - A company mission statement
    - A comparison of medical procedures

   Clarifying other media
    - Labels on button, icons and screens
    - Captions and callouts for graphics

                                            23
Advantages and Disadvantages
            of using texts
   Advantages
      Is relatively inexpensive to produce

      Present abstract ideas effectively

      Clarifies other media

      Provides confidentiality

      Is easily changed or updated




   Disadvantages
      Is less memorable than other visual media

      Requires more attention from the user than other

       media
      Can be cumbersome

                                                          24
Summary
   Multimedia applications and presentations invariably rely
    to some extent on the use of text to convey their
    message to users

   Text has many characteristics that the developer can
    modify to enhance the user experience
     - size, weight, typeface, style, colour, kerning, tracking,
       etc.

   Antialiasing is a technique that can be used to improve
    the readability of text


                                                                   25
Next lecture...

We will looking at images
 The different types of image

 How we capture images

 Generating and editing images




                                  26

More Related Content

Viewers also liked

Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
Adrian Mikeliunas
 
4 multimedia basics
4 multimedia basics4 multimedia basics
4 multimedia basics
Vedpal Yadav
 
Applied Electronics - Power Supply
Applied Electronics - Power SupplyApplied Electronics - Power Supply
Applied Electronics - Power Supply
Swapnil Agrawal
 
Lecture # 3
Lecture # 3Lecture # 3
Lecture # 3
Mr SMAK
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2
Mr SMAK
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
Mr SMAK
 
Lecture# 7 midi file format
Lecture#  7 midi file formatLecture#  7 midi file format
Lecture# 7 midi file format
Mr SMAK
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
BITS
 
Lecture 9 animation
Lecture 9 animationLecture 9 animation
Lecture 9 animation
Mr SMAK
 
Operating system security
Operating system securityOperating system security
Operating system security
Rachel Jeewa
 
Lecture5 graphics
Lecture5   graphicsLecture5   graphics
Lecture5 graphics
Mr SMAK
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
Arvind Krishnaa
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
Oles Seheda
 
Linux kernel architecture
Linux kernel architectureLinux kernel architecture
Linux kernel architecture
Teja Bheemanapally
 
Unix - An Introduction
Unix - An IntroductionUnix - An Introduction
Unix - An Introduction
Deepanshu Gahlaut
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
Mohammed Fareed
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
Swapnil Agrawal
 

Viewers also liked (20)

Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
 
4 multimedia basics
4 multimedia basics4 multimedia basics
4 multimedia basics
 
Applied Electronics - Power Supply
Applied Electronics - Power SupplyApplied Electronics - Power Supply
Applied Electronics - Power Supply
 
Lecture # 3
Lecture # 3Lecture # 3
Lecture # 3
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2
 
Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
 
Lecture# 7 midi file format
Lecture#  7 midi file formatLecture#  7 midi file format
Lecture# 7 midi file format
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
 
Lecture 9 animation
Lecture 9 animationLecture 9 animation
Lecture 9 animation
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Lecture5 graphics
Lecture5   graphicsLecture5   graphics
Lecture5 graphics
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Linux kernel architecture
Linux kernel architectureLinux kernel architecture
Linux kernel architecture
 
Unix - An Introduction
Unix - An IntroductionUnix - An Introduction
Unix - An Introduction
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
 

Similar to Lecture 4 text

Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
Jay Patel
 
Chapter 3 - Text.pptsdg
Chapter 3 - Text.pptsdgChapter 3 - Text.pptsdg
Chapter 3 - Text.pptsdg
FarisZainudin1
 
Unit 2 graphics
Unit 2 graphicsUnit 2 graphics
Unit 2 graphics
Arnav Chowdhury
 
Multimedia Design Chapter 2
Multimedia Design Chapter 2Multimedia Design Chapter 2
Multimedia Design Chapter 2
Mohd Harris Ahmad Jaal
 
Typography
TypographyTypography
Typography
SmtDeepaKC
 
Chap7
Chap7Chap7
Chap7
dkd_woohoo
 
Std 11 Computer Chapter 1 Introduction to Multimedia (Part 1)
Std 11 Computer Chapter 1  Introduction to Multimedia (Part 1)Std 11 Computer Chapter 1  Introduction to Multimedia (Part 1)
Std 11 Computer Chapter 1 Introduction to Multimedia (Part 1)
Nuzhat Memon
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
vishal choudhary
 
Multimedia chapter 2
Multimedia chapter 2Multimedia chapter 2
Multimedia chapter 2
PrathimaBaliga
 
Multimedia chapter 2
Multimedia chapter 2Multimedia chapter 2
Multimedia chapter 2
PrathimaBaliga
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
nooramirahazmn
 
Chapter 2 : TEXT
Chapter 2 : TEXTChapter 2 : TEXT
Chapter 2 : TEXT
azira96
 
Chapter 5 Text
Chapter 5 TextChapter 5 Text
Chapter 5 Text
shelly3160
 
Multimedia Chapter 3 - Lecture 03 Text.pdf
Multimedia Chapter 3 - Lecture 03 Text.pdfMultimedia Chapter 3 - Lecture 03 Text.pdf
Multimedia Chapter 3 - Lecture 03 Text.pdf
ShaffikaSuhaimi1
 
Text
TextText
Chapter Five
Chapter FiveChapter Five
Chapter Five
Nada G.Youssef
 
Saw13 ch02-ppt
Saw13 ch02-pptSaw13 ch02-ppt
Saw13 ch02-ppt
CEPadgett
 
textinformationandmedia-190522081153.pptx
textinformationandmedia-190522081153.pptxtextinformationandmedia-190522081153.pptx
textinformationandmedia-190522081153.pptx
JemaimaNgayyacGuday
 
Typography
TypographyTypography
Graphic Design first class (1).pptx
Graphic Design first class (1).pptxGraphic Design first class (1).pptx
Graphic Design first class (1).pptx
SubhashisRoyOfficial
 

Similar to Lecture 4 text (20)

Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
 
Chapter 3 - Text.pptsdg
Chapter 3 - Text.pptsdgChapter 3 - Text.pptsdg
Chapter 3 - Text.pptsdg
 
Unit 2 graphics
Unit 2 graphicsUnit 2 graphics
Unit 2 graphics
 
Multimedia Design Chapter 2
Multimedia Design Chapter 2Multimedia Design Chapter 2
Multimedia Design Chapter 2
 
Typography
TypographyTypography
Typography
 
Chap7
Chap7Chap7
Chap7
 
Std 11 Computer Chapter 1 Introduction to Multimedia (Part 1)
Std 11 Computer Chapter 1  Introduction to Multimedia (Part 1)Std 11 Computer Chapter 1  Introduction to Multimedia (Part 1)
Std 11 Computer Chapter 1 Introduction to Multimedia (Part 1)
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
 
Multimedia chapter 2
Multimedia chapter 2Multimedia chapter 2
Multimedia chapter 2
 
Multimedia chapter 2
Multimedia chapter 2Multimedia chapter 2
Multimedia chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2 : TEXT
Chapter 2 : TEXTChapter 2 : TEXT
Chapter 2 : TEXT
 
Chapter 5 Text
Chapter 5 TextChapter 5 Text
Chapter 5 Text
 
Multimedia Chapter 3 - Lecture 03 Text.pdf
Multimedia Chapter 3 - Lecture 03 Text.pdfMultimedia Chapter 3 - Lecture 03 Text.pdf
Multimedia Chapter 3 - Lecture 03 Text.pdf
 
Text
TextText
Text
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Saw13 ch02-ppt
Saw13 ch02-pptSaw13 ch02-ppt
Saw13 ch02-ppt
 
textinformationandmedia-190522081153.pptx
textinformationandmedia-190522081153.pptxtextinformationandmedia-190522081153.pptx
textinformationandmedia-190522081153.pptx
 
Typography
TypographyTypography
Typography
 
Graphic Design first class (1).pptx
Graphic Design first class (1).pptxGraphic Design first class (1).pptx
Graphic Design first class (1).pptx
 

More from Mr SMAK

Assigments2009
Assigments2009Assigments2009
Assigments2009
Mr SMAK
 
Week1
Week1Week1
Week1
Mr SMAK
 
Evaluation of cellular network
Evaluation of cellular networkEvaluation of cellular network
Evaluation of cellular network
Mr SMAK
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Cellular network
Cellular networkCellular network
Cellular network
Mr SMAK
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Parallel architecture
Parallel architectureParallel architecture
Parallel architecture
Mr SMAK
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Mr SMAK
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Mr SMAK
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
Mr SMAK
 
Chapter 2 ASE
Chapter 2 ASEChapter 2 ASE
Chapter 2 ASE
Mr SMAK
 
Structure of project plan and schedule
Structure of project plan and scheduleStructure of project plan and schedule
Structure of project plan and schedule
Mr SMAK
 
Proposal format
Proposal formatProposal format
Proposal format
Mr SMAK
 
Proposal announcement batch2009
Proposal announcement batch2009Proposal announcement batch2009
Proposal announcement batch2009
Mr SMAK
 
List ofsuparco projectsforuniversities
List ofsuparco projectsforuniversitiesList ofsuparco projectsforuniversities
List ofsuparco projectsforuniversities
Mr SMAK
 
Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009
Mr SMAK
 
Fyp registration form batch 2009
Fyp registration form batch 2009Fyp registration form batch 2009
Fyp registration form batch 2009
Mr SMAK
 

More from Mr SMAK (20)

Assigments2009
Assigments2009Assigments2009
Assigments2009
 
Week1
Week1Week1
Week1
 
Evaluation of cellular network
Evaluation of cellular networkEvaluation of cellular network
Evaluation of cellular network
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Cellular network
Cellular networkCellular network
Cellular network
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Parallel architecture
Parallel architectureParallel architecture
Parallel architecture
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Chapter 2 ASE
Chapter 2 ASEChapter 2 ASE
Chapter 2 ASE
 
Structure of project plan and schedule
Structure of project plan and scheduleStructure of project plan and schedule
Structure of project plan and schedule
 
Proposal format
Proposal formatProposal format
Proposal format
 
Proposal announcement batch2009
Proposal announcement batch2009Proposal announcement batch2009
Proposal announcement batch2009
 
List ofsuparco projectsforuniversities
List ofsuparco projectsforuniversitiesList ofsuparco projectsforuniversities
List ofsuparco projectsforuniversities
 
Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009
 
Fyp registration form batch 2009
Fyp registration form batch 2009Fyp registration form batch 2009
Fyp registration form batch 2009
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Lecture 4 text

  • 1. LECTURE 4 THE USES OF TEXT IN MULTIMEDIA Prepared by Razia Nisar Noorani 1
  • 2. Objective  Media Types  What text is  How text is created and stored in the computer  How text is used in Multimedia Systems  Advantages and Disadvantages of using texts 2
  • 3. Temporal & Non Temporal Media Media  Refer to Multimedia elements.  Two Media types:Temporal and Non-Temporal Temporal Media  The media has an associated time aspect. Example: its view changes with respect to time.  Examples: Audio, video, animation, music etc. 3
  • 4. Temporal & Non Temporal Media Non-Temporal Media  Also known as a static media. It has the same representation regardless of time  Examples: texts, graphics, paintings, book etc  Multimedia applications are typically composed of both media 4
  • 5. What is Text  Basic media for many multimedia systems  Texts in the form of words, sentences and paragraphs is used to communicate thoughts, ideas and facts in nearly every aspect of our lives.  Multimedia products depends on text for many things: - to explain how the application work - to guide the user in navigating through the application - deliver the information for which the application was designed 5
  • 6. What is Text  Minimize the texts in multimedia application  Texts consists of two structures:  Linear  Non-Linear 6
  • 7. Text Technology  Based on creating letters, numbers and special characters.  Text elements can be categories into:  Alphabet characters : A - Z  Numbers : 0 - 9  Special characters : Punctuation [. , ; ‘ …] , Sign or Symbols [* & ^ % $ £ ! / ~ # @ .…]  Also known Character Sets  May also include special icon or drawing symbols, mathematical symbols, Greek Letter etc. 7
  • 8. Typefaces, Fonts and Points Typefaces  The graphic representations of the alphabet, numbers and special character.  Usually vary by type sizes and styles. Fonts  Particular size of typefaces  Usually vary by type sizes and styles.  The sizes are measured in points - One point is 1/72” or 0.0138 inc” - Measuring distance from the top of a capital letters (e.g. ‘A or P’) to the bottom of a descenders (e.g. ‘y , ‘p’ , ‘q’). 8
  • 9. Fonts Effects  A numbers of effects that are useful for bringing viewer’s attention to content:  Case: UPPER and lower letter  Bold, Italic, Underline, superscript or subscript  Embossed or Shadow  Colours  Strikethrough b 9
  • 10. Types of Fonts  Two classes of fonts: Serif or Sans Serif  Serif fonts use decorative tips or flags at the ends of a letter strokes  Sans Serif fonts don’t have these features  Serif fonts are usually used for documents or screens that have large quantities of text - This is because the serif helps guide the reader’s eye along the text 10
  • 11. Types of Fonts  For computer displays, Sans Serif fonts considered better because of the sharper contrast. Examples of San Serif fonts Times New Roman Century Gothic Bookman Arial Rockwell Light Comic Sans MS Courier New Impact Century Tahoma Examples of Serif fonts 11
  • 12. Text Characteristics This example shows the Times New Roman font Ascender Capital Height x-Height FD xhp Point size Serif p -Height Descender 12
  • 13. Tracking, Kerning and Leading Av Unkerned AvKerned 13
  • 14. Tracking, Kerning and Leading Reading Line One Leading Reading Line One  Ascender : an upstroke on a character  Descender : the down stroke below the baseline of a character  Leading : spacing above and below a font or Line spacing  Tracking : spacing between characters  Kerning : space between pairs of characters, usually as an overlap for improvement appearance 14
  • 15. Bitmapped and vector fonts  Fonts can either be stored as bitmapped or vector graphics  Bitmaps font depend to the size and the pixel numbers - File size increases as more sizes are added  Vector fonts can draw any size by scaling the vector drawing primitives mathematically - File size is much smaller than bitmaps - TrueType and PostScript are vector font formats 15
  • 16. Bitmapped and vector fonts A bitmapped font A vector font 16
  • 17. Jaggies and Antialiasing  Jaggies are the jagged edges you see when a bitmapped image is resized  It is a consequence of the underlying array of pixels from which the image is composed  Antialiasing is a technique that can be used to eliminate jagged edges  It substitutes additional pixels in other colours to fool the brain into thinking it is seeing continuous lines 17
  • 18. Jaggies and Antialiasing  The technique is used to blend the font into the background by transitioning the colour from the font colour to background.  This technique minimizes the jagged edges making for a smoother overall appearance. 18
  • 20. Text Data Files  The common data encoding schemes for text are:  Plain text (ASCII) is text in an electronic format that can be read and interpreted by humans  Rich text is similar but it also embeds special control characters into the text to provide additional features  Hypertext is an advance on rich text which allows the reader to jump to different sections within the document or even jump to a new document 20
  • 21. Text Data Files Plain text This is plain text. It is readable by humans. It can contains numbers (01234) and punctuation (.,#@*&) since it uses the ASCII character set. Rich text This is <bold>rich text</bold>.<br><center>It is also readable by humans but contains additional tags which control the presentation of the text.</center> Hypertext This is <a href=“http://www.w3c.org/”>hypertext</a>. It uses the rich text format shown above but adds the ability to hyperlink to other documents.<hr><img src=“logo.gif”> 21
  • 22. Working With Text  Considerations and guidelines when we are working with text:  Be Concise  Use the appropriate typefaces and fonts  Make it readable  Consider type styles and colors  Use restraint and be consistent 22
  • 23. How text can be used effectively  Communicating Data - Customer names and address - Pricing information of products  Explaining concepts and ideas - A company mission statement - A comparison of medical procedures  Clarifying other media - Labels on button, icons and screens - Captions and callouts for graphics 23
  • 24. Advantages and Disadvantages of using texts  Advantages  Is relatively inexpensive to produce  Present abstract ideas effectively  Clarifies other media  Provides confidentiality  Is easily changed or updated  Disadvantages  Is less memorable than other visual media  Requires more attention from the user than other media  Can be cumbersome 24
  • 25. Summary  Multimedia applications and presentations invariably rely to some extent on the use of text to convey their message to users  Text has many characteristics that the developer can modify to enhance the user experience - size, weight, typeface, style, colour, kerning, tracking, etc.  Antialiasing is a technique that can be used to improve the readability of text 25
  • 26. Next lecture... We will looking at images  The different types of image  How we capture images  Generating and editing images 26

Editor's Notes

  1. SCA3103 - Introduction to Multimedia Sesi 2003/04 Sem II Lecture 4