Presentation is loading. Please wait.

Presentation is loading. Please wait.

Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308:

Similar presentations


Presentation on theme: "Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308:"— Presentation transcript:

1 Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308: lab sections 16, 17, 19, 20

2 Computer Graphic Formats

3 Encoding Graphics, Pictures, and Images Two different approaches to encoding graphics: –bitmap or raster –vector or object oriented

4

5 Bitmap uses a code to indicate the state of each individual pixel takes a lot of storage space for each image slower file transfer times.bmp.pcx.tif.gif.jpg can modify by changing individual pixels realistic images

6 CIRCLE 40 Y 200 150

7 Vector consists of a set of instructions that recreate a picture less storage space than a bitmap picture can easily modify the picture.wmf.dxf..mgx.cgm

8 Sources of Graphics Files Clip Art Gallery Internet Image scanner Create your own –Microsoft Paint –Adobe

9 Computer Crime The use of computers to commit unauthorized acts.

10 Major Categories manipulation or theft of data or assets direct attack on hardware, software, or data using the computer for conducting or planning a crime unauthorized use of the computer for personal gain

11 Computer Crime Laws different for each state define computer data and software as personal property define as a crime: – unauthorized access, use, modification of data – disabling a computer system

12 Federal Legislation Computer Fraud and Abuse Act (1984) Computer Fraud and Abuse Act (1986) Computer Abuse Amendment Act (1994)

13 UW Computer Use Policy Improper use includes, but is not limited to the following:  Use for personal gain, such as using the computing facilities for another job outside of the University.  Use which intentionally interferes with legitimate use by others.  Use of the electronic communication facilities to deliver threats to others, including sexual harassment.

14 Viruses a program designed to reproduce itself and spread from one computer to another can destroy data, display irritating messages or otherwise disrupt computer operations generally infects the executable files

15 Other Software Hazards Time Bombs –Michelangelo Logic Bombs Worms –Internet 1988 Trojan Horses –Explore Zip Denial of Service Attack

16 Detecting a Computer Virus virus detection programs –checksum –signature virus removal programs information for virus protection for Windows 95/NT: –http://www.ccse.net/~tgrant/virus.htm

17 Preventative Measures back up your data use some type of virus detection and removal program and keep it updated check any files downloaded from the Internet always check e-mail attachments before opening or running them

18 Virus Information http://www.symantec.com/avcenter/vinfodb.html http://www.sophos.com/virusinfo/ for information about virus hoaxes: –http://www.DataFellows.com/news/hoax.htm#aol4free


Download ppt "Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308:"

Similar presentations


Ads by Google