Discuss some of the factors that go into designing a multimedia application.
What will be an ideal response?
Designing multimedia applications requires careful thought and a systematic approach. Multimedia applications can be printed on beautiful brochures, placed into attractive corporate reports, uploaded to the Internet, or displayed on large screens for viewing. Because these applications are typically more expensive than preparing documents and files in a word-processing program, it is important to spend time designing the best possible multimedia applications. Designing a multimedia application requires that the end use of the document or file be carefully considered. Because different computers and Web browsers display information differently, it is a good idea to select styles, fonts, and presentations based on computers and browsers that are likely to display the multimedia application. Because large files can take much longer to load into a Web page, smaller files are usually preferred for Web-based multimedia applications.
You might also like to view...
The major difference between a CheckBox and a RadioButton is that:
a) RadioButtons are generally grouped to allow choices b) CheckBoxes usually represent options that allow more than one to be used c) Only one RadioButton per group can be selected at once d) b and c
To invoke a parent’s constructor in a subclass, we use the ______________ method.
a) abstract b) construct c) parent d) super e) extends
If you create a(n) ________, Access will not let you enter a new value in the field if that value is already entered in the same field within another record
A) multiple-field index B) custom format C) input mask D) single-field index
Critical Thinking Questions Case Study 9-1? ? Pedro likes to surf the Internet and downloads several files. He does not know much about computer security. He thinks if he has a password to sign-in he is secure. To help him be protected in the future, you explain that he needs to be sure that the ______ is turned on. a. malware b. spyware c. Windows Firewall d. router?
What will be an ideal response?