Module 8

Ace your homework & exams now with Quizwiz!

What type of laws should computer investigators be especially aware of when working with image files in order to avoid infringement violations? International Forensics Civil Copyright

Copyright

The process of converting raw images to another format is called which of the following? Transmogrification Data conversion Demosaicing Transfiguring

Demosaicing

What is the process of converting raw picture data to another format called? Rastering Demosaicing Abstracting Rendering

Demosaicing

In which format are most digital photographs stored? PNG TIFF GIF EXIF

EXIF

What methods do steganography programs use to hide data in graphics files? Insertion Substitution Either of the above None of the above

Either of the above

If a graphics file cannot be opened in an image viewer, what should the next step be? Examining the file's name Examining the file's size Examining the file's header data Examining the file's extension

Examining the file's header data

A JPEG file is an example of a vector graphic. True False

False

A graphics program creates and saves one of three types of image files: bitmap, vector, or XIF. True False

False

All TIF files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 3B. True False

False

Copyright laws don't apply to Web sites. True False

False

Graphics files stored on a computer can't be recovered after they are deleted. True False

False

Only one file format can compress graphics files. True False

False

Operating systems do not have tools for recovering image files. True False

False

When investigating graphics files, you should convert them into one standard format. True False

False

When viewing a file header, you need to include hexadecimal information to view the image. True False

True

What is the simplest way to access a file header? Use an image editor Use a text editor Use a hexadecimal editor Use a disk editor

Use a hexadecimal editor

A JPEG file uses which type of compression? WinZip Lossy Lzip Lossless

Lossy

Which type of compression compresses data permanently by discarding bits of information in the file? Lossy Lossless Redundant Huffman

Lossy

In JPEG files, what's the starting offset position for the JFIF label? Offset 6 Offset 0 Offset 2 Offset 4

Offset 6

When you carve a graphics file, recovering the image depends on which of the following skills? Recognizing the pattern of the data content Recognizing the pattern of a corrupt file Recognizing the pattern of the file header content Recovering the image from a tape backup

Reecognizing the pattern of file header content

Digital pictures use data compression to accomplish which of the following goals? Save space on a hard drive. Provide a crisp and clear image. Eliminate redundant data. All of the above

Save space on a hard drive

What is another term for steganalysis tools? Image editors Hexadecimal editors Steg tools Image tools

Steg tools

What technique has been used to protect copyrighted material by inserting digital watermarks into a file? Compression Steganography Encryption Archiving

Steganography

Which term refers to a data-hiding technique that uses host files to cover the contents of a secret message? Steganalysis Graphie Steganography Steganos

Steganography

Which data-hiding technique replaces bits of the host file with other bits of data? Substitution Insertion Pixelation Replacement

Substitution

From which file format is the image format XIF derived? TIF BMP GIF JPEG

TIF

Some clues left on a drive that might indicate steganography include which of the following? Steganography programs in the suspect's All Programs list Graphics files with the same name but different file sizes Multiple copies of a graphics file All of the above

All of the above

How may computer programs be registered under copyright laws? As literary works As motion pictures As architectural works As audiovisual works

As literary works

Which images store graphics information as grids of pixels? Raster Metafile Bitmap Vector

Bitmap

What tools are used to create, modify, and save bitmap, vector, and metafile graphics? Image readers Graphics viewers Image viewers Graphics editors

Graphics editors

Which data-hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program? Insertion Substitution Pixelation Replacement

Insertion

What methods are used for digital watermarking? Implanted subroutines that link to a central Web server automatically when the watermarked file is accessed Using a hex editor to alter the image data Nothing; this is what you'd expect to see. Invisible modification of the LSBs in the file

Invisible modification of the LSBs in the file

Which JFIF format has a hexadecimal value of FFD8 FFE0 in the first four bytes? BMP JPEG EPS GIF

JPEG

Bitmap (.bmp) files use which of the following types of compression? WinZip Lossless Lzip Lossy

Lossless

What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data? Recursive Lossless Vector quantization Lossy

Lossless

Which of the following is true about JPEG and TIF files? They differ from other graphics files because their file headers contain more bits. They differ from other graphics files because their file headers contain fewer bits. They have different values for the first 2 bytes of their file headers. They have identical values for the first 2 bytes of their file headers.

They have different values for the first 2 bytes of their file headers

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic. True False

True

Each type of graphics file has a unique header containing information that distinguishes it from other types of graphics files. True False

True

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file. True False

True

The Internet is the best source for learning more about file formats and their extensions. True False

True

The two major forms of steganography are insertion and substitution. True False

True

To identify an unknown graphics file format you need to examine a copy of the unknown file with a hexadecimal editor to find the hex code for the first several bytes of the file. True False

True

Under copyright laws, maps and architectural plans may be registered as pictorial, graphic, and sculptural works. True False

True

What kinds of images are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes? Vector graphics Line-art images Metafile graphics Bitmap images

Vector graphics


Related study sets

Chapter 5 - nursing process and critical thinking

View Set

Chapter 30: The Child with Integumentary Dysfunction

View Set

ch 27 face/neck injuries practice

View Set

Organizational Behavior Exam 2 Review

View Set

Wife of Bath's Tale, only answered questions i thought were important

View Set

Chapter 03 - Peripherals and Expansion

View Set

Normal Curve: Chapter 13 Personality

View Set

Med Surg II - Chapt 66 - Management of Pts with Neurologic Dysfunction

View Set

Compensation Chapter 11- Performance Appraisals

View Set

C.S. 150 Chapter 5 (Control Structures II (Repetition))

View Set

Chapter IV: How to Form a Business

View Set

Fresno State BIO 10 Homework 9: Lactose Intolerance

View Set