Q1.Digital Convergence
It is the capacity to view the same multimedia content from different types of devices. For instance, watching a YouTube Video from the TV via a connected laptop or going through the social media on the TV screen connected to the phone. It is made possible by the digitization of media content and improved links. It makes it possible for people to interrelate, play, converse and share information through a new range of platforms.
Q2. Purpose of the Digital Living Network Alliance
The DLNA is the bridge between different bits of gears. It technically brings all your devices together both wired and wireless. It is the technology that enables individuals to share materials such as photos, videos, music with each other within a household without straining. It is a simplified home cloud that facilitates the moving of the above materials from one device to the other.
Q3.Difference between Analog and Digital sound waves
The analog sound wave is recorded and utilizes in its original form. In this case, a signal is moved straight from the microphone to the tape. The tide is amplified and sent directly to the speaker. The wave is continuous, and it is therefore impossible to pick a point when the pitch changes.
However, the digital sound wave is an improved analog wave that is sampled, programmed into binary and stored on a digital gadget. To listen to the audio requires the numbers to be converted into voltage wave. It is a compound of several segments that makes it possible to tell moments of different strengths and pitch.
Q4 Copyleft
It is a licensing that allows the public to have the freedom to amend the original, copy and share software and creative works. The copyright owner grants the irrevocable public permission to use his actions.
Copyleft can be used when an individual wants to distribute a particular software freely. It could also be favorable when a developer wishes to modify the software to encourage improvements on it. In the creative world, individuals who want to use some original works to educate or in case of music choreography can request for the licensing.
Copyright infringement is expensive and illegal. To avoid a copyright issue, it is essential for an individual to seek permission from the other and if it is impossible to reach him/her, the persons to rephrase the words that allow them to sound different.
The individual could also avoid using a large segment of the copyrighted items because that would automatically be a copyright infringement. In some cases, the persons could claim fair use if he intended to criticize, educate or perform research on the works.
Q5. Plagiarism
It is the act of taking another author work and representing the work as your own. The infringement is subject to fines and penalties and in cases of a student, expulsion.
Under the academic definition, there are three examples of plagiarism:
Direct plagiarism is when an individual lifts directly another persons work without quotations or citation.
Mosaic Plagiarism is when an individual retains the original arrangement of the works even though he /she has changed some words or left out others.
Ideological plagiarism is the representation of another persons ideas and practices and failing to acknowledge the source.
Q7 Digital manipulation
Digital manipulation is also called photo manipulation. Images are amplified using a computer application to generate stunning, appealing images.
Digital manipulation becomes unethical when the editor aims to misrepresent reality and lie to his/her audience. Some editors do post-production on photographs by adding features that were not there, which is ok if they intended to scale their creativity. However, is any edits are aimed to deceive the audience, it, therefore, becomes unethical.
The audience acquires a false image of the brand or product which is hugely risky and could ruin the online reputation.
It is important that any individual protects his/her online presence and reputation. It could be done by seeking legal advice in case the status is diminishing. Another way would represent you and the brand well with a decent profile and no grammatical errors. Finally one could be careful with the things he puts online by being reflective rather than reactive.
Q8 Thou shall not use a computer to harm others is most broken in the commandments of computer ethics. With the generation of social media, most people bully and troll others behind a computer keyboard. They say hurtful things that they would ordinarily not say to the target person.
Â
Request Removal
If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal:
- Machine Learning Algorithms Using CNV Data to Classify Cancers - Literature Review Example
- Judges and Their Works
- Ethical Issues Facing IT Managers and Security Professionals
- Essay Example: Cloud Risk Assessment
- Collection of Information Barriers Specific Actions Timelines - Paper Example
- What Are the Managerial Implications Concerning Information Systems? Coursework Example
- Essay on Communication Infrastructure and Human Rights