1 / 18

Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet.

Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308: lab sections 16, 17, 19, 20. Computer Graphic Formats. Encoding Graphics, Pictures, and Images.

emily
Download Presentation

Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Final ExamWednesday, May 10th 1:15 am - 3:15 amBring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308: lab sections 16, 17, 19, 20

  2. Computer Graphic Formats

  3. Encoding Graphics, Pictures, and Images • Two different approaches to encoding graphics: • bitmap or raster • vector or object oriented

  4. Bitmap • uses a code to indicate the state of each individual pixel • takes a lot of storage space for each image • slower file transfer times • .bmp .pcx .tif .gif .jpg • can modify by changing individual pixels • realistic images

  5. CIRCLE 40 Y 200 150

  6. Vector • consists of a set of instructions that recreate a picture • less storage space than a bitmap picture • can easily modify the picture • .wmf .dxf. .mgx .cgm

  7. Sources of Graphics Files • Clip Art Gallery • Internet • Image scanner • Create your own • Microsoft Paint • Adobe

  8. Computer Crime The use of computers to commit unauthorized acts.

  9. Major Categories • manipulation or theft of data or assets • direct attack on hardware, software, or data • using the computer for conducting or planning a crime • unauthorized use of the computer for personal gain

  10. Computer Crime Laws • different for each state • define computer data and software as personal property • define as a crime: • unauthorized access, use, modification of data • disabling a computer system

  11. Federal Legislation • Computer Fraud and Abuse Act (1984) • Computer Fraud and Abuse Act (1986) • Computer Abuse Amendment Act (1994)

  12. UW Computer Use Policy • Improper use includes, but is not limited to the following: • Use for personal gain, such as using the computing facilities for another job outside of the University. • Use which intentionally interferes with legitimate use by others. • Use of the electronic communication facilities to deliver threats to others, including sexual harassment.

  13. Viruses • a program designed to reproduce itself and spread from one computer to another • can destroy data, display irritating messages or otherwise disrupt computer operations • generally infects the executable files

  14. Other Software Hazards • Time Bombs • Michelangelo • Logic Bombs • Worms • Internet 1988 • Trojan Horses • Explore Zip • Denial of Service Attack

  15. Detecting a Computer Virus • virus detection programs • checksum • signature • virus removal programs • information for virus protection for Windows 95/NT: • http://www.ccse.net/~tgrant/virus.htm

  16. Preventative Measures • back up your data • use some type of virus detection and removal program and keep it updated • check any files downloaded from the Internet • always check e-mail attachments before opening or running them

  17. Virus Information • http://www.symantec.com/avcenter/vinfodb.html • http://www.sophos.com/virusinfo/ • for information about virus hoaxes: • http://www.DataFellows.com/news/hoax.htm#aol4free

More Related