Vector Graphics Typically Are Generated Using Drawing Or: Adobe Illustrator
Vector Graphics Typically Are Generated Using Drawing Or: Adobe Illustrator
1
imagery well and often can be problematic for cross-platform
exchange. Vector graphics typically are saved as EPS
format.
BMP
The BMP file format (Windows bitmap) handles graphics files within the
Microsoft Windows OS. Typically, BMP files are uncompressed, hence they are
3
large; the advantage is their simplicity and wide acceptance in Windows
programs.
PNG
The PNG (Portable Network Graphics) file format was created as the free,
open-source successor to the GIF. The PNG file format supports truecolor (16
million colors) while the GIF supports only 256 colors. The PNG file excels when
the image has large, uniformly colored areas. The lossless PNG format is best
suited for editing pictures, and the lossy formats, like JPG, are best for the final
distribution of photographic images, because JPG files are smaller than PNG
files. Many older browsers currently do not support the PNG file format, however,
with Mozilla Firefox or Internet Explorer 7, all contemporary web browsers now
support all common uses of the PNG format, including full 8-bit translucency
(Internet Explorer 7 may display odd colors on translucent images ONLY when
combined with IE's opacity filter). The Adam7-interlacing allows an early preview,
even when only a small percentage of the image data has been transmitted.
PNG provides a patent-free replacement for GIF and can also replace many
common uses of TIFF. Indexed-color, grayscale, and truecolor images are
supported, plus an optional alpha channel.
PNG is designed to work well in online viewing applications, such as the World
Wide Web, so it is fully streamable with a progressive display option. PNG is
robust, providing both full file integrity checking and simple detection of common
transmission errors. Also, PNG can store gamma and chromaticity data for
improved color matching on heterogeneous platforms.
Some programs do not handle PNG gamma correctly, which can cause the
images to be saved or displayed darker than they should be.[3]
Animated formats derived from PNG are MNG and APNG. The latter is
supported by Firefox and Opera and is backwards compatible with PNG.
TIFF
The TIFF (Tagged Image File Format) format is a flexible format that normally
saves 8 bits or 16 bits per color (red, green, blue) for 24-bit and 48-bit totals,
respectively, usually using either the TIFF or TIF filename extension. TIFF's
flexibility can be both an advantage and disadvantage, since a reader that reads
every type of TIFF file does not exist. TIFFs can be lossy and lossless; some
offer relatively good lossless compression for bi-level (black&white) images.
Some digital cameras can save in TIFF format, using the LZW compression
algorithm for lossless storage. TIFF image format is not widely supported by web
browsers. TIFF remains widely accepted as a photograph file standard in the
printing business. TIFF can handle device-specific color spaces, such as the
CMYK defined by a particular set of printing press inks. OCR (Optical Character
4
Recognition) software packages commonly generate some (often
monochromatic) form of TIFF image for scanned text pages.
JPEG/JFIF
GIF
To Do the following
5
choose a paper type from
the Paper list box.
This tip has been written for CorelDRAW® Graphics Suite X3. While similar features
might be available in previous releases the tip will be fully applicable to CorelDRAW
Graphics Suite X3 and newer versions only.
6
With CorelDRAW®, drawing basic shapes — such as rectangles, ellipses, polygons,
and stars — is quick and easy. All the tools you need are easily accessible from the
following flyouts in the toolbox: the Rectangle flyout, the Ellipse flyout, and the Object
flyout.
Top to bottom: the Rectangle flyout, the Ellipse flyout, and the Object flyout
• To draw a rectangle, open the Rectangle flyout, click the Rectangle tool ,
and drag in the drawing window until the rectangle is the size you want.
• To draw a square, click the Rectangle tool, hold down Ctrl, and drag in the
drawing window until the square is the size you want.
7
Drawing a rectangle at an angle with the 3 point rectangle tool
• You can draw a rectangle from its center outward by holding down Shift as
you drag with the Rectangle tool.
• You can draw a square from its center outward by holding down Shift + Ctrl
as you drag with the Rectangle tool.
• You can draw a rectangle that covers the drawing page by double-clicking the
Rectangle tool.
You can draw an ellipse or a circle by dragging diagonally with the Ellipse
tool, or you can draw an ellipse by using the 3 point ellipse tool to specify
its width and height. The 3 point ellipse tool lets you quickly create an
ellipse at an angle, eliminating the need to rotate the ellipse. Both tools are
located on the Ellipse flyout.
After you draw an ellipse or a circle, you can easily change it into a pie shape or an
arc.
• To draw an ellipse, open the Ellipse flyout, click the Ellipse tool ,and
drag where you want to place it. Holding down Ctrl while dragging with the
Ellipse tool draws a circle, while holding down Shift draws an ellipse from the
center.
8
• To change the ellipse into a pie shape or an arc, click the Pie button or the
Arc button on the property bar.
• To draw an ellipse at an angle, click the 3 point ellipse tool , and drag in the
drawing window to draw the centerline of the ellipse at the angle you want.
Next, move the pointer to define the height of the ellipse, and click.
Note: The centerline runs through the center of the ellipse and determines
its width.
You can draw polygons and two types of stars: perfect stars, which have a
traditional star appearance and complex stars, which have intersecting
sides. With perfect stars, you can apply a fill to the entire star shape. With
complex stars, you can produce unique results when you apply a fill.
9
Left to right: a polygon, a perfect star, and a complex star, each with a fountain fill
applied
The tools you need to create polygons and stars are located on the Object flyout.
• To draw a polygon, open the Object flyout, click the Polygon tool , and drag
in the drawing window until the polygon is the size you want. You can draw a
polygon from its center by holding down Shift as you drag. Also, you can draw
a symmetrical polygon by holding down Ctrl as you drag.
• To draw a perfect star, click the Star tool , and drag in the drawing window
until the star is the size you want.
• To draw a complex star, click the Complex star tool , and drag in the
drawing window until the star is the size you want.
1 Open the Perfect Shapes flyout, and click one of the following tools:
· Basic shapes
Lets you draw a wide variety of shapes, such as triangles, cans,
parallelograms, and smiley faces
· Arrows shapes
Lets you draw perfect shape arrows
10
· Flowchart shapes
Lets you draw flowchart shapes
· Star shapes
Lets you draw a star
· Callout shapes
Lets you draw predefined callouts
2 Open Perfect Shapes picker on the property bar, and click a shape.
3 Drag in the drawing window until the shape is the size you want.
Note
Note
11
Working with text in Corel DRAW is really interesting experience because you can edit the text in so many
ways.
You can apply outline to the text in Corel DRAW. Different types of effects can be created using outline.
12
6. Now right click on any color in the color palette.
7. This will apply the outline to the text of the same color you have right clicked.
8. If you Right click on the cross icon in the color palette, there will be no outline to the text.
Realistic fill using texture applies different dimensions to the text. You will use thick font and apply different
types of textures. Try to use different colors for outline.
Corel DRAW comes up with the wide range of texture fills useful for backgrounds and may other purposes.
13
This lesson will explain the way combine command handles fountain fill and further it will reveal the
difference between group and combine.
1. We have two identical rectangles ungrouped filled with separate fountain fills.
2. Select both of them.
3. Go to Arrange > Combine
4. Both the rectangles are combined.
5. Now please carefully observe the fountain fill.
6. When grouped, the fill are separate with two centers in each rectangle.
7. After combine command is applied, both the rectangles are treated as one single object and hence
the two fills are turned into one single fountain fill.
8. This fill has one center and both the rectangles are treated as big one single rectangle.
9. Go to Arrange > Break Curve Apart
10. The object is separated again and we have two different rectangles with two separate radial fills.
Let us start from the last lesson where we practiced group and combine on the identical rectangles. They
are kept side by side and filled with different colors. Delete any one rectangle. Select the rectangle left on
the page.
Step 1
Shut down your PC. Place the scanner close to the PC on a flat surface. The cable of the scanner
must be able to reach your computer.
Step 2
Disconnect the parallel cable of the printer from the parallel port on the back of your PC.
Step 3
Attach the parallel cable of the scanner into the port where the printer's cable was attached. The
25-pin female end of the parallel cable is connected to the PC and then other end of the cable plugs
into the scanner's port. For using the printer as well as the scanner, connect the printer cable to the
scanner and then connect the scanner to the PC.
Step 4
Insert the power cord of the scanner into an outlet. Once you plug in the power cord, the scanner
starts by itself. Some scanners will require manual intervention for turning them on. If your scanner
has an on/off switch, switch it on once you plug in the power cord.
Step 5
Turn on your PC. The Operating System (OS) installed in your PC will automatically recognize the
new hardware that has been added. If your OS does not recognize the new hardware, Click on
Start >> Settings >> Control Panel . Double click on the Add New Hardware option. A new
wizard will appear that will guide you through the installation process.
Step 6
The installation wizard at some point will ask you to install the driver disk that has all the required
information files. Insert the driver disk at the appropriate time, and then choose the device's .INF
(Information) file from the disk to have all the information properly installed. During this process
you may also install TWAIN driver.
Step 7
You may also install all other additional software’s that you may have received with your scanner. It
is advisable to calibrate the scanner before you start using it. The color calibration software tries to
maintain the original colors of the image throughout its processing. This means that what you see
on the monitor and what you print out should be reasonably close to the colors of the original.
15
Scanning
Outline:
1. Introduction to scanning
2. Scan using Photoshop
3. Steps for scanning
4. Saving a scanned image
5. Scan using the scanning software
6. See the differences in resolution
7. Open class to Q & A
In Detail:
1. Introduction to scanning
a. Need a scanner and the scanning software
i. If you do not have the software
1. You can not do a scan
2. On the company’s web site you can purchase it or
download it for free
b. With a scanner you can scan
i. Photographs
ii. Drawings and prints
iii. Illustrations
iv. Publications and documents
v. Anything that can fit in the scan bed
2. Scan using Photoshop
a. Photoshop can not do scans
b. Instead, you can use Photoshop to initiate an application to do a scan, and
then import the image into Photoshop.
c. Steps
i. Place a color photograph on the scan bed
ii. Open Photoshop
1. On the menu toolbar choose File > Import
a. Select the scanning software
iii. The software will open and do a preview scan of the photo
3. Steps for scanning
a. Select the area you wish to scan
i. Click, drag, and make a box around the image
1. Resize or move if necessary
b. Choose output type
i. Go with True color
1. For color photographs
ii. Mention others
1. Grayscale
a. Black and White photographs
2. Black and White
a. 2 colors, Black and White
3. 256 color
a. Graphics like logos
c. Select resolution
16
i. Discuss pixels
ii. Cover PPI
1. Pixels Per Inch
iii. Cover DPI
1. Dots Per inch
iv. Discuss what is recommended for the web
1. 72 ppi
v. Discuss what is recommended for printing
1. Minimum 300 dpi
vi. Go with 300 resolution to show what happens in Photoshop with
an image that has a higher resolution than 72
d. Dimensions
i. Cover the possibility of changes output dimensions
ii. Do not change the dimensions
e. Place Image
i. For Photoshop choose File > Place Image
1. This will scan the image, put it in Photoshop, and close the
scanning software
4. Saving a scanned image
a. Never manipulate the image before saving it first
i. You want to keep the original
b. Choose File > Save
i. Save it on the desktop as photo_300.tif
1. The .tiff or .tif file
a. Very universal
b. Not usually compressed
c. Keep all colors
d. Keep the clarity
e. Lossless
c. Show the difference between actual pixels and print size
i. Discuss how this refers back to the resolution
d. Now you can make changes to the image like Unsharp mask
5. Scan using the scanning software
a. Open the software
b. Choose Scan > Preview
c. Follow the same steps for scanning as listed previously
i. Select a resolution of 72
ii. Except do not choose File > Place
iii. Instead when all else is complete choose
1. File > Save As
a. Save on the dektop as photo_72.tif
d. Close the scanning software
6. See the differences in resolution
a. Open Photoshop
i. Open both files
1. Examine the image’s
a. Quality
b. Image size
17
c. File size
Saving your files:-
Step 1
Step 2
Click on File.
Step 3
Step 4
Type a new name for the file, if you want to rename it, in the "File name" box.
Step 5
Hit the arrow next to the "Save as type" box and choose what format you want to
save it in.
Step 6
Step 7
18
How to Secure Files on a Computer
Protect and Secure Important data on Windows Computers
Most Windows computers use a file system called NTFS (NT File System) when storing
files to a hard-drive. This allows information to be protected in ways that many are not
familiar with. Without any additional software files can have specific permissions
assigned to them to limit access. Documents can also be encrypted to prevent anyone but
the owner from reading them.
The first thing to do is verify that Simple File Sharing is disabled. This can be done from
My Computer. Using the menu bar, navigate to Tools then Folder Options. On the View
Tab, navigate to the Use simple file sharing option, uncheck it and click OK. It can
always be re-enabled after applying the NTFS settings. Detailed information on disabling
this feature can be found at the Microsoft Support web-site.
Disabling Simple File Sharing will enable and give access to the Security Tab Right
clicking on the file or folder and choose properties will reveal the Security Tab and the
permissions assigned to specific users or groups. The Users group is normally given
permissions by default. This allows anyone with access to the computer to read files. This
can be removed or modified if desired.
In addition to the measures above, it is always a good idea to follow basic security
recommendations when protecting important documents:
Learning how to configure and use these steps might take a few hours or minutes
depending on computer skills. The peace of mind it gives if files or a computer are lost is
well worth it.
19
5 Steps to Securing your Data
5 little known steps that you can take to ensure that your data is safe. A hard-drive crash
is devastating, and it is something that no one wants to go through. That's why you
should follow each of these steps to help prevent hard drive crashes, and in the case
that one does occur, insure that your data is safe.
One of the most painful things ever is when your hard drive crashes. It puts you into a
state of disbelief. What could make this situation even worse? Well, sometimes, its the
thought that you never backed up your computer. This is the importance of backing up
your data Regularly. You can backup your datas on CDs, DVDs or a removable HD. Or
you could even use online service such as Carbonite or Mozy which back up your data
to an online. C’mon, be honest, how many times have you thought of backing up your
hard drive but you said something along the lines of “Ill do it tomorrow”. You’re not
alone. Experts advise that you should backup at least once per week. I however would
backup twice per week, as well as immediately after I have stored some very important
data. Backing up doesn’t always mean dumping your whole HD. Some programs allow
incremental backups which backup your whole HD the first time then only modified files
after that. Backing up is extremely important no matter what OS you have (although
some OSs reduce the chance of a crash), how fast your computer is or any other stat like
that, because nobody is protected from bad luck.
2. Make sure YOU are the only one using your data
Spyware, dialers, backdoors and root kits – Before you can protect yourself you need to
know what these do. Spyware and adware are often bundled together. Spyware does just
what it says. It spies on you. Dialers dial telephone numbers via your computer's modem.
They often dial expensive long distance calls at your expense. Backdoors open up a
“backdoor” to your computer allowing other computers to connect with you to distribute
malware. Rootkits are designed to camouflage itself in a system's core processes so as to
go undetected. It is the hardest of all malware to detect and therefore to remove. To
protect yourself from these types of malware, all you need is a good two way firewall.
These block all attempts to access your computer unless you specifically allow it. They
also block attempts for programs to access the internet unless you allow it. Zone Alarm
is an amazing freeware program which does just that. It can be downloaded here.
Trojans, keyloggers, viruses, worms, wabbits and hijackers – Trojans are arguably the
most dangerous kind of malware. While Trojans rarely destroy computers or even files,
that's only because they have bigger targets: your financial information, your computer's
system resources, and other extremely sensitive data. Keyloggers are pretty self evident,
20
they log your keystrokes. That’s it. Viruses are programs (usually embedded inside other
programs or files) that duplicate its self and then spread to other machines via e-mail etc.
Worms are a slight variation on a virus. They usually target networks and they are not
embedded. Wabbits are very rare. They are a virus except they have no instruction to
spread to other machines. Their sole purpose is to utterly devastate a single machine.
Hijackers are in essence, a form of adware. They hijack your searches and display
websites of their choice. These things are a little harder to fully prevent. With the
previous category, the malware can be stopped immediately. This category, however, can
only be detected once your computer is infected. A good anti-virus program will be able
to catch these things before they are able to do any significant damage. AVG antivirus is
free and good. You can download it here.
Exploits
Exploits attack specific security vulnerabilities. You know how Microsoft is always
announcing new updates for its operating system? Often enough the updates are really
trying to close the security hole targeted in a newly discovered exploit. To best prevent
these, try to download OS updates regularly.
BLABLA
This might snot seem so obvious but it is tremendously important. Hard drives spin really
fast (thousands of RPM) and heat up to around 30-40 degrees Celsius. Because the hard
drive is one of the only moving parts in a computer, it is the most delicate. If your
computer is not properly ventilated, it can overheat and crash. Extreme heat could even
warp the disc that your data is stored on. That’s why it is always important to monitor
your hard-drive’s temperature, as well as health. A couple of good programs are Active
SMART and HDDLife.
This is another thing that is not very obvious. Defragging actually speeds up your
computer without installing any 3rd party apps. A lot of people know that it works but
not very many people know how it works. Here I will describe the latter. Your disk is
divided into many parts with sizes already predetermined (like 512 bytes). These parts are
called sectors. When you add files to a new HDD they all go into one sector if possible
and if not they go into sequential sectors. When you edit a file, it will store the new
information on a different sector, because the previous sector is full. This builds up, and
eventually your hard drive must access hundreds of different sectors to load a single
program, making read/write arm swing all over the place. This makes the loading process
slow. Defragging your hard drive rearranges these files so that all program files are on
sequential, if not a single sector, which makes the overall process faster.
21
5. Encrypt sensitive data
Even if you take all of the security precautions, the only way to fully prevent the risk of
malware is to unplug your internet connection. This method is extremely impractical
because… well… your not connected to the internet. That is why you should always
encrypt your data. Not only does it save your data from malicious software, but it also
makes sure that no one can access files on your computer physically, without the
password. There are a lot of freeware data encryption programs… some of which are
very good. There are programs like AxCrypt or TrueCrypt that will do this for you. If you
are really considering this, there are programs that you can buy which are extremely
effective like Encrypt-Easy which has the capability to encrypt with tons of algorithms.
And if you get two encryption programs… you could in theory encrypt the encrypted file!
22
A user interface is the system by which people (users) interact with a machine. The user
interface includes hardware (physical) and software (logical) components. User interfaces
exist for various systems, and provide a means of:
Ever since the increased use of personal computers and the relative decline in societal
awareness of heavy machinery, the term user interface has taken on overtones of the
(graphical) user interface, while industrial control panel and machinery control design
discussions more commonly refer to human-machine interfaces.
Other terms for user interface include human-computer interface (HCI) and man-
machine interface (MMI).
23
How do I change my username and/or password?
Below are the steps on how to change your username and/or password in major
operating systems, online services, and other locations. Keep in mind that
unless you're the administrator or root of the system you, will need to know the
password of the account before changing it into something else. Click on one of
the below links to scroll down automatically to steps on how to change the
username or password
Change password
Note: The Windows password can also be changed through the Users icon
in Control Panel.
Change username
You can change the user settings in Windows 95/98 through the Users icon
in Control Panel. However, this does not allow you to change the actual
username. If you need to change the username, we suggest you create a
copy of your existing username and use the new user name. Below are the
steps to do this.
24
Windows 2000
Change password
Enter your old password and the new password you wish to use.
Change username
Windows XP
Change password
Change username
25
Linux / Unix and most variants
Change password
Almost all Linux / Unix and variants have access to the passwd command.
Enter this command at the prompt to change your password. You'll need
to know the current password before being able to change the password
to a new password.
See our passwd command page for additional information about this
command.
Change username
In order to change the username you will need to have root or super-user
access.
To change the username of an account, use the vipw command. See our
vipw command page for additional information about this command.
To change the user settings, use the chfn command. See our chfn
command page for additional information about this command.
BIOS passwords
Change password
The system password (password you see when first turning on the
computer) as well as the BIOS password (password you see when entering
the BIOS) are both changed through the BIOS.
Change username
26
Internet username and passwords
Like the Computer Hope forums, most forums allow a user to change their
password only through the profile or account settings. However, most
companies will not allow you to change your username; usually, you must
create new account to do this. If you need additional service with
changing your username or password on another website, we suggest you
contact the company or webmaster in control of that website.
27
Username and Password Information
You need a personal user account to log in to the NIH eRA Commons. This requires a unique
username (from 6 to 20 characters) and a password (minimum length of 6 characters). The
username and password can be any combination of letters and numbers.
If you forget your password, the NIH eRA Commons provides a capability for you to request that
your password be reset. In this case, a new password is generated and sent to you at the email
address contained in your user profile.
1. Access the NIH eRA Commons Home page as described in Logging In.
2. Click the Forgot Password? hyperlink to open the Reset Password page (FRW0002).
3. In the User ID field, type your username and press Tab to move to the Email Address
field.
4. Type your email address and press Enter or click Submit. The system returns you to the
Home page and displays a confirmation message indicating that your password has been
reset.
28
All files and folders in Windows have attributes. Some of those are being set automatically
(either by the operating system or by the program that accesses the specified resource) while
others are being set by the user.
So what these attributes do? File/folder attributes set the folder accessibility options – for example,
specific attributes can determine whether a folder is read-only, hidden or is a system element. Many
of these attributes are already set for the vast majority of folders on your PC, however, you can also
set those manually, whenever you need to apply those.
In Windows, there are 5 types of file/folder attributes that can be set up. Those are:
Reasoning:
Users may wish to create shares on their computer for any of the below
reasons.
Answers:
Creating a network share within Windows
Users can easily share any of their directories or drives by following the
below steps. Note: Microsoft Windows does not allow for a single file to
be shared, it must be the directory or drive that the file is within that is
shared.
A program that compresses (ie: shrinks) files down in size so that can
be uploaded, downloaded and E-mail with greater ease.
30