SlideShare a Scribd company logo
1 of 4
Digital Communications – MMS




                Michelle Tompkins
What does MMS stand for?
• MMS is an abbreviation of multimedia
  messaging service. This is most
  commonly used with mobile phones to
  send a picture/song/video to
  someone else.
• It has extended the core SMS (short
  message service) which is the
  standard messaging service for up to
  160 characters of text.
What can be in a MMS?
• Formats that can be used in MMS are:
• Text, which can be formatted with colours
  fonts etc.
• Images, in a JPEG or GIF file.
• Audio, in MP3 or MIDI files.
• Video, in an MPEG form.
• MMS messages can also be sent to email
  addresses.
• MMS also has no size limit, however for larger
  MMS messages, a 3G (3rd generation) phone
  is required.
What are it’s uses?
• In private use, MMS is often used to send
  pictures via mobile phone to friends and
  family etc.
• MMS in public use is uncommon although can
  be used for advertising, by sending an image
  out to a quantity of mobile numbers, and can
  also be used to send resources to students
  etc.
• MMS can be used in companies/businesses
  for example, companies can send MMS
  messages to subscribers, enquirers or
  customers.

More Related Content

What's hot

Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersAswathi Nair
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 

What's hot (20)

Denial of service
Denial of serviceDenial of service
Denial of service
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Firewalls
FirewallsFirewalls
Firewalls
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Network security
Network securityNetwork security
Network security
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security
Network securityNetwork security
Network security
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cyber security
Cyber securityCyber security
Cyber security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 

Viewers also liked

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introductionmamahow
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And TransactionsGwenaël Le Bodic
 
SMS & MMS Technologies
SMS & MMS TechnologiesSMS & MMS Technologies
SMS & MMS TechnologiesArun Shukla
 
MBA Presentation
MBA PresentationMBA Presentation
MBA Presentationchasers
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
Sms powerpoint
Sms powerpointSms powerpoint
Sms powerpointchrisfant
 
Mahindra & Mahindra Presentation
Mahindra & Mahindra  PresentationMahindra & Mahindra  Presentation
Mahindra & Mahindra PresentationR S Raghav
 
Multimedia data and file format
Multimedia data and file formatMultimedia data and file format
Multimedia data and file formatNiketa Jain
 
Mahindra & mahindra
Mahindra & mahindraMahindra & mahindra
Mahindra & mahindraBHAVIN GALA
 
File formats and its types
File formats and its typesFile formats and its types
File formats and its typesAnu Garg
 
Ppt on automobile industry
Ppt on automobile industryPpt on automobile industry
Ppt on automobile industryPriya Tiwari
 
Automobile industry presentation [autosaved]
Automobile industry presentation [autosaved]Automobile industry presentation [autosaved]
Automobile industry presentation [autosaved]krishnakantjalan
 
multimedia element
multimedia elementmultimedia element
multimedia elementAZMAN KADIR
 

Viewers also liked (20)

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introduction
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And Transactions
 
SMS & MMS Technologies
SMS & MMS TechnologiesSMS & MMS Technologies
SMS & MMS Technologies
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Mms
MmsMms
Mms
 
security issue
security issuesecurity issue
security issue
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
MBA Presentation
MBA PresentationMBA Presentation
MBA Presentation
 
Automobile industry
Automobile industryAutomobile industry
Automobile industry
 
Ch5
Ch5Ch5
Ch5
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Sms powerpoint
Sms powerpointSms powerpoint
Sms powerpoint
 
Mahindra & Mahindra Presentation
Mahindra & Mahindra  PresentationMahindra & Mahindra  Presentation
Mahindra & Mahindra Presentation
 
Multimedia data and file format
Multimedia data and file formatMultimedia data and file format
Multimedia data and file format
 
Mahindra & mahindra
Mahindra & mahindraMahindra & mahindra
Mahindra & mahindra
 
File formats and its types
File formats and its typesFile formats and its types
File formats and its types
 
Ppt on automobile industry
Ppt on automobile industryPpt on automobile industry
Ppt on automobile industry
 
Automobile industry
Automobile industryAutomobile industry
Automobile industry
 
Automobile industry presentation [autosaved]
Automobile industry presentation [autosaved]Automobile industry presentation [autosaved]
Automobile industry presentation [autosaved]
 
multimedia element
multimedia elementmultimedia element
multimedia element
 

Similar to Digital Communications - What is MMS and How is it Used

Mobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael HanleyMobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael HanleySara Quinn
 
Difference between mms and sms messaging
Difference between mms and sms messagingDifference between mms and sms messaging
Difference between mms and sms messagingLakshmi Narayanan
 
Electronic messaging through internet
Electronic messaging through internetElectronic messaging through internet
Electronic messaging through internetDearMudassir
 
Assessment 1 digycoms
Assessment 1 digycomsAssessment 1 digycoms
Assessment 1 digycomsJonah Ford
 
Brief history of sms
Brief history of smsBrief history of sms
Brief history of smsDaniyal Khan
 
Sms texting
Sms texting Sms texting
Sms texting osistrunk
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices_kevininmoscow
 

Similar to Digital Communications - What is MMS and How is it Used (10)

Mobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael HanleyMobile Message Delivery: SMS and MMS_Michael Hanley
Mobile Message Delivery: SMS and MMS_Michael Hanley
 
Difference between mms and sms messaging
Difference between mms and sms messagingDifference between mms and sms messaging
Difference between mms and sms messaging
 
Electronic messaging through internet
Electronic messaging through internetElectronic messaging through internet
Electronic messaging through internet
 
Assessment 1 digycoms
Assessment 1 digycomsAssessment 1 digycoms
Assessment 1 digycoms
 
Email
EmailEmail
Email
 
Mms
MmsMms
Mms
 
Dat rewind
Dat rewindDat rewind
Dat rewind
 
Brief history of sms
Brief history of smsBrief history of sms
Brief history of sms
 
Sms texting
Sms texting Sms texting
Sms texting
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices
 

More from modernmichelle

Abercrombie and fitch
Abercrombie and fitch Abercrombie and fitch
Abercrombie and fitch modernmichelle
 
Magazine Front Cover Flat Plan
Magazine Front Cover Flat PlanMagazine Front Cover Flat Plan
Magazine Front Cover Flat Planmodernmichelle
 
Front Cover Magazine Flat Plan
Front Cover Magazine Flat PlanFront Cover Magazine Flat Plan
Front Cover Magazine Flat Planmodernmichelle
 

More from modernmichelle (6)

Abercrombie and fitch
Abercrombie and fitch Abercrombie and fitch
Abercrombie and fitch
 
Mms presentation
Mms presentationMms presentation
Mms presentation
 
Blockbuster Proposal
Blockbuster ProposalBlockbuster Proposal
Blockbuster Proposal
 
Diesel Presentation
Diesel PresentationDiesel Presentation
Diesel Presentation
 
Magazine Front Cover Flat Plan
Magazine Front Cover Flat PlanMagazine Front Cover Flat Plan
Magazine Front Cover Flat Plan
 
Front Cover Magazine Flat Plan
Front Cover Magazine Flat PlanFront Cover Magazine Flat Plan
Front Cover Magazine Flat Plan
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Digital Communications - What is MMS and How is it Used

  • 1. Digital Communications – MMS Michelle Tompkins
  • 2. What does MMS stand for? • MMS is an abbreviation of multimedia messaging service. This is most commonly used with mobile phones to send a picture/song/video to someone else. • It has extended the core SMS (short message service) which is the standard messaging service for up to 160 characters of text.
  • 3. What can be in a MMS? • Formats that can be used in MMS are: • Text, which can be formatted with colours fonts etc. • Images, in a JPEG or GIF file. • Audio, in MP3 or MIDI files. • Video, in an MPEG form. • MMS messages can also be sent to email addresses. • MMS also has no size limit, however for larger MMS messages, a 3G (3rd generation) phone is required.
  • 4. What are it’s uses? • In private use, MMS is often used to send pictures via mobile phone to friends and family etc. • MMS in public use is uncommon although can be used for advertising, by sending an image out to a quantity of mobile numbers, and can also be used to send resources to students etc. • MMS can be used in companies/businesses for example, companies can send MMS messages to subscribers, enquirers or customers.