)A representation, consisting of rows and columns of dots, of a graphics image in computer memory. The value of each dot (whether it is filled in or not) is stored in one or more bits of data. For simple monochrome images, one bit is sufficient to represent each dot, but for colors and shades of gray, each dot requires more than one bit of data. The more bits used to represent a dot, the more colors and shades of gray that can be represented.
The density of the dots, known as the resolution, determines how sharply the image is represented. This is often expressed in dots per inch (dpi ) or simply by the number of rows and columns, such as 640 by 480.
To display a bit-mapped image on a monitor or to print it on a printer, the computer translates the bit map into pixels (for display screens) or ink dots (for printers). Optical scanners and fax machines work by transforming text or pictures on paper into bit maps.
Bit-mapped graphics are often referred to as raster graphics. The other method for representing images is known as vector graphics or object-oriented graphics. With vector graphics, images are represented as mathematical formulas that define all the shapes in the image. Vector graphics are more flexible than bit-mapped graphics because they look the same even when you scale them to different sizes. In contrast, bit-mapped graphics become ragged when you shrink or enlarge them.
Fonts represented with vector graphics are called scalable fonts , outline fonts , or vector fonts. The best-known example of a vector font system is PostScript. Bit-mapped fonts, also called raster fonts, must be designed for a specific device and a specific size and resolution.
Featured Partners Sponsored
- Increase worker productivity, enhance data security, and enjoy greater energy savings. Find out how. Download the “Ultimate Desktop Simplicity Kit” now.»
- Find out which 10 hardware additions will help you maintain excellent service and outstanding security for you and your customers. »
- Server virtualization is growing in popularity, but the technology for securing it lags. To protect your virtual network.»
- Before you implement a private cloud, find out what you need to know about automated delivery, virtual sprawl, and more. »