Solved

Bitmap files

Posted on 1998-09-24
5
186 Views
Last Modified: 2013-12-03
Does anyone know of a site on the Internet that has a great number of bitmap files? Any response would be greatly appreciated.

C
0
Comment
Question by:Commander
5 Comments
 
LVL 3

Expert Comment

by:gward28
ID: 1010837
what type(s) are you looking for ?
0
 
LVL 2

Expert Comment

by:gikam
ID: 1010838
0
 
LVL 3

Expert Comment

by:gward28
ID: 1010839
0
 
LVL 1

Expert Comment

by:Undertow
ID: 1010841
every site on the web can be a bitmap if you want it to be.  Simple file conversion from .gif, .jpg, or .png to .bmp takes almost 5 seconds.....
0
 
LVL 5

Accepted Solution

by:
theh95 earned 50 total points
ID: 1010842
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question