際際滷

際際滷Share a Scribd company logo
Dhacaini
   Computer recognize only two discrete state: on and off
    -because computers are electronic devices powered by electricity, which
     also has only two state on and off.
   Digit 0 represents the electronic state of off
   Digit 1 represents the electronic state of on
   Binary system  a number system that has just to unique digits 0 and 1
    called bits.
   Bit  smallest unit of data the computer can process.
   Byte  grouped by 8 bits together
           - provides enough different combination of 0s and 1s to represent 256
             individual characters. (numbers, uppercase & lowercase letters of
             alphabet, punctuation marks and others)
   Coding scheme  combination of 0s and 1s that represent characters are
             defined by patterns.
   ASCII (American Standard Code for Information Interchange)
     - most widely used coding scheme to represent data
   ASCII coding scheme is sufficient for English and Western European
    languages but not large enough for Asian and other languages that use
    different alphabets.
   Unicode  16-bit coding scheme that has the capacity of representing more
    than 65,000 characters and symbols.
      - implement in several operating system such as Window, Mac OS and
         Linux.
   Unicode-enable programming languages and software include Java, XML,
    Microsoft Office and Oracle
Dhacaini
How characters are converted?
1.   Press a key on keyboard.
2.   Chip in the keyboard converts the keys electronic signal into a special
     code that is sent to the system unit.
3.   System unit converts the code into ASCII binary code and store it in
     memory for processing.
4.   Every character is converted to its corresponding byte and process the
     data.
5.   Software converts the byte into number, letters or other character that
     recognize by human is then displayed on screen.
Dhacaini
Ad

Recommended

Input devices [autosaved]
Input devices [autosaved]
Zahida Pervaiz
Usb 72213 76207
Usb 72213 76207
Muruly Krishan
Basic computer
Basic computer
Milestone College
Microsoft Office & Hardware of Computer By Rimon Rayhan
Microsoft Office & Hardware of Computer By Rimon Rayhan
BUBT-Bangladesh University of Business and Tecnology
Binary number system (part 2)
Binary number system (part 2)
Billy Jean Morado
4 character encoding-ascii
4 character encoding-ascii
irdginfo
System Unit
System Unit
chrispaul8676
Chong ren jye
Chong ren jye
chrispaul8676
Topic 2.3 (1)
Topic 2.3 (1)
nabilbesttravel
Chapter 2
Chapter 2
Hajar Len
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
EstelaJeffery653
Chapter 2 computer system
Chapter 2 computer system
Aten Kecik
Chapter 2 computer system
Chapter 2 computer system
meisaina
...........................Assignment.pptx
...........................Assignment.pptx
rajpootfazi52
Data Representation class 11 computer.pptx
Data Representation class 11 computer.pptx
DEV8C
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdf
A23AyushRajBaranwal
chapter-2.pptx
chapter-2.pptx
RithinA1
Chapter2puc1firstyearnotessssssssss.docx
Chapter2puc1firstyearnotessssssssss.docx
SimranShaikh84
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
BhawaniShankarSahu1
Computer Introduction (Software)-Lecture03
Computer Introduction (Software)-Lecture03
Dr. Mazin Mohamed alkathiri
Learning Area 2
Learning Area 2
norshipa
Learning Area 2
Learning Area 2
norshipa
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
SwagatoBiswas
Coding System
Coding System
Rafiqah Nabihah bt Rossazali
Introduction to programming concepts
Introduction to programming concepts
hermiraguilar
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
Milind Patil
Basic four document of Economics studing
Basic four document of Economics studing
HabtamuBore
Data representation in a computer
Data representation in a computer
Girmachew Tilahun
Buses in a computer
Buses in a computer
chrispaul8676
Expansion Slot
Expansion Slot
chrispaul8676

More Related Content

Similar to Dhacaini (20)

Topic 2.3 (1)
Topic 2.3 (1)
nabilbesttravel
Chapter 2
Chapter 2
Hajar Len
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
EstelaJeffery653
Chapter 2 computer system
Chapter 2 computer system
Aten Kecik
Chapter 2 computer system
Chapter 2 computer system
meisaina
...........................Assignment.pptx
...........................Assignment.pptx
rajpootfazi52
Data Representation class 11 computer.pptx
Data Representation class 11 computer.pptx
DEV8C
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdf
A23AyushRajBaranwal
chapter-2.pptx
chapter-2.pptx
RithinA1
Chapter2puc1firstyearnotessssssssss.docx
Chapter2puc1firstyearnotessssssssss.docx
SimranShaikh84
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
BhawaniShankarSahu1
Computer Introduction (Software)-Lecture03
Computer Introduction (Software)-Lecture03
Dr. Mazin Mohamed alkathiri
Learning Area 2
Learning Area 2
norshipa
Learning Area 2
Learning Area 2
norshipa
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
SwagatoBiswas
Coding System
Coding System
Rafiqah Nabihah bt Rossazali
Introduction to programming concepts
Introduction to programming concepts
hermiraguilar
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
Milind Patil
Basic four document of Economics studing
Basic four document of Economics studing
HabtamuBore
Data representation in a computer
Data representation in a computer
Girmachew Tilahun
Chapter 2
Chapter 2
Hajar Len
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
EstelaJeffery653
Chapter 2 computer system
Chapter 2 computer system
Aten Kecik
Chapter 2 computer system
Chapter 2 computer system
meisaina
...........................Assignment.pptx
...........................Assignment.pptx
rajpootfazi52
Data Representation class 11 computer.pptx
Data Representation class 11 computer.pptx
DEV8C
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdf
A23AyushRajBaranwal
chapter-2.pptx
chapter-2.pptx
RithinA1
Chapter2puc1firstyearnotessssssssss.docx
Chapter2puc1firstyearnotessssssssss.docx
SimranShaikh84
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
BhawaniShankarSahu1
Learning Area 2
Learning Area 2
norshipa
Learning Area 2
Learning Area 2
norshipa
COMPUTER FUNDAMENTALS PPT.pptx
COMPUTER FUNDAMENTALS PPT.pptx
SwagatoBiswas
Introduction to programming concepts
Introduction to programming concepts
hermiraguilar
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
Milind Patil
Basic four document of Economics studing
Basic four document of Economics studing
HabtamuBore
Data representation in a computer
Data representation in a computer
Girmachew Tilahun

More from chrispaul8676 (13)

Buses in a computer
Buses in a computer
chrispaul8676
Expansion Slot
Expansion Slot
chrispaul8676
Power Supply
Power Supply
chrispaul8676
Ports and connectors
Ports and connectors
chrispaul8676
data representation
data representation
chrispaul8676
It presentation
It presentation
chrispaul8676
Identity theft
Identity theft
chrispaul8676
It ppt new
It ppt new
chrispaul8676
System failure
System failure
chrispaul8676
Unauthorized access and use
Unauthorized access and use
chrispaul8676
Software theft
Software theft
chrispaul8676
Hardware theft
Hardware theft
chrispaul8676
Ad

Recently uploaded (20)

FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
Muhammad Rizwan Akram
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
June Patch Tuesday
June Patch Tuesday
Ivanti
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
Muhammad Rizwan Akram
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
June Patch Tuesday
June Patch Tuesday
Ivanti
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Ad

Dhacaini

  • 2. Computer recognize only two discrete state: on and off -because computers are electronic devices powered by electricity, which also has only two state on and off. Digit 0 represents the electronic state of off Digit 1 represents the electronic state of on Binary system a number system that has just to unique digits 0 and 1 called bits. Bit smallest unit of data the computer can process. Byte grouped by 8 bits together - provides enough different combination of 0s and 1s to represent 256 individual characters. (numbers, uppercase & lowercase letters of alphabet, punctuation marks and others) Coding scheme combination of 0s and 1s that represent characters are defined by patterns.
  • 3. ASCII (American Standard Code for Information Interchange) - most widely used coding scheme to represent data ASCII coding scheme is sufficient for English and Western European languages but not large enough for Asian and other languages that use different alphabets. Unicode 16-bit coding scheme that has the capacity of representing more than 65,000 characters and symbols. - implement in several operating system such as Window, Mac OS and Linux. Unicode-enable programming languages and software include Java, XML, Microsoft Office and Oracle
  • 5. How characters are converted? 1. Press a key on keyboard. 2. Chip in the keyboard converts the keys electronic signal into a special code that is sent to the system unit. 3. System unit converts the code into ASCII binary code and store it in memory for processing. 4. Every character is converted to its corresponding byte and process the data. 5. Software converts the byte into number, letters or other character that recognize by human is then displayed on screen.