Posts

Showing posts from October, 2017

Week 9: Multimedia and Hypermedia on the Internet

Image
In today’s world, media has become as essential as our daily needs. The word was first used in respect of books and newspapers i.e. print media and with the advent of technology, media now encompasses television, movies, radio and internet. The internet has undoubtedly been the largest driving force in media development and advancement, giving rise to concepts like multimedia and hypermedia, which can be found readily around us — be it the devices we carry with us or digital billboards on the side of buildings. But what exactly do both of those terms mean? Multimedia refers to digital content that can be represented in various forms such as text, audio, images, animations, video and interactive content. Multimedia can be recorded and played, displayed, interacted with or accessed by information content processing devices, such as computerized and electronic devices.  Hypermedia is one application of multimedia. It is a computer-based information retrieval system that en

Week 8: Security and Protecting Yourself on the Internet

Image
What is Internet Security? It involves establishing rules and measures to use against attacks over the Internet. The Internet is often an insecure channel for exchanging information, exposing it to threats of intrusion or fraud, which can be done in various ways: 1. Malicious Software: A computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms. 2. Denial-of-service (DoS) attacks: This is an attempt to make a computer resource unavailable to its intended users. This generally consists of the concerted efforts to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Attackers commonly target cloud computing environments like organizations and governments. 3. Phishing: This is an attack which targets online users for extraction of their sensitive information such as username, password and cre

Week 6: Using Common Internet Tools

Image
This week's blog post topic is video production, so I decided to upload a video I did for a past Communication module 😊 This video was my first time using video editing software, and I have to say: kudos to YouTubers, film & TV editors because video editing ain't easy! It was many grueling hours of frustration, re-watching the same raw footage over and over again, cutting footage and piecing them together repeatedly, trying all the special effects available ― all just to produce one 5 minute video. And without further ado, here's the video: