SlideShare a Scribd company logo
1 of 6
•   Computer recognize only two discrete state: on and off
    -because computers are electronic devices powered by electricity, which
     also has only two state on and off.
•   Digit 0 represents the electronic state of off
•   Digit 1 represents the electronic state of on
•   Binary system – a number system that has just to unique digits 0 and 1
    called bits.
•   Bit – smallest unit of data the computer can process.
•   Byte – grouped by 8 bits together
           - provides enough different combination of 0s and 1s to represent 256
             individual characters. (numbers, uppercase & lowercase letters of
             alphabet, punctuation marks and others)
•   Coding scheme – combination of 0s and 1s that represent characters are
             defined by patterns.
•   ASCII (American Standard Code for Information Interchange)
     - most widely used coding scheme to represent data
•   ASCII coding scheme is sufficient for English and Western European
    languages but not large enough for Asian and other languages that use
    different alphabets.
•   Unicode – 16-bit coding scheme that has the capacity of representing more
    than 65,000 characters and symbols.
      - implement in several operating system such as Window, Mac OS and
         Linux.
•   Unicode-enable programming languages and software include Java, XML,
    Microsoft Office and Oracle
How characters are converted?
1.   Press a key on keyboard.
2.   Chip in the keyboard converts the key’s electronic signal into a special
     code that is sent to the system unit.
3.   System unit converts the code into ASCII binary code and store it in
     memory for processing.
4.   Every character is converted to its corresponding byte and process the
     data.
5.   Software converts the byte into number, letters or other character that
     recognize by human is then displayed on screen.
data representation

More Related Content

Viewers also liked

Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
Aten Kecik
 
Data Encoding
Data EncodingData Encoding
Data Encoding
Luka M G
 

Viewers also liked (18)

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
Unicode 101
Unicode 101Unicode 101
Unicode 101
 
Unicode
UnicodeUnicode
Unicode
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, UnicodeOracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
 
Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)
 
Fundamental Unicode in Perl
Fundamental Unicode in PerlFundamental Unicode in Perl
Fundamental Unicode in Perl
 
Coding system
Coding systemCoding system
Coding system
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Unicode
UnicodeUnicode
Unicode
 
Unicode
UnicodeUnicode
Unicode
 
Unicode
UnicodeUnicode
Unicode
 
Ch 4 ict in-day2_day_life
Ch 4 ict in-day2_day_lifeCh 4 ict in-day2_day_life
Ch 4 ict in-day2_day_life
 
Ict – information & communication technology
Ict – information & communication technologyIct – information & communication technology
Ict – information & communication technology
 
Curriculum development at primary and secondary level
Curriculum development at primary and secondary levelCurriculum development at primary and secondary level
Curriculum development at primary and secondary level
 
21st Century Education
21st Century Education21st Century Education
21st Century Education
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 

Similar to data representation

Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
Milind Patil
 
Compgenerations pented
Compgenerations pentedCompgenerations pented
Compgenerations pented
Sajib
 
Comp conn 3 bits and bytes
Comp conn 3 bits and bytesComp conn 3 bits and bytes
Comp conn 3 bits and bytes
allsaintstech
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
Ahmed Saber
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
eysipi
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
Ankur Kumar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 

Similar to data representation (20)

Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Bank Exam Computer Awareness
Bank Exam Computer AwarenessBank Exam Computer Awareness
Bank Exam Computer Awareness
 
Topic 2.3 (1)
Topic 2.3 (1)Topic 2.3 (1)
Topic 2.3 (1)
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
Compgenerations pented
Compgenerations pentedCompgenerations pented
Compgenerations pented
 
Comp conn 3 bits and bytes
Comp conn 3 bits and bytesComp conn 3 bits and bytes
Comp conn 3 bits and bytes
 
Lesson 17- Representing text
Lesson 17- Representing textLesson 17- Representing text
Lesson 17- Representing text
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
 
Adv uni
Adv uniAdv uni
Adv uni
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
 
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdfCh 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdf
 
09 Tait
09 Tait09 Tait
09 Tait
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 

More from chrispaul8676 (15)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software theft
Software theftSoftware theft
Software theft
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

data representation

  • 1.
  • 2. Computer recognize only two discrete state: on and off -because computers are electronic devices powered by electricity, which also has only two state on and off. • Digit 0 represents the electronic state of off • Digit 1 represents the electronic state of on • Binary system – a number system that has just to unique digits 0 and 1 called bits. • Bit – smallest unit of data the computer can process. • Byte – grouped by 8 bits together - provides enough different combination of 0s and 1s to represent 256 individual characters. (numbers, uppercase & lowercase letters of alphabet, punctuation marks and others) • Coding scheme – combination of 0s and 1s that represent characters are defined by patterns.
  • 3. ASCII (American Standard Code for Information Interchange) - most widely used coding scheme to represent data • ASCII coding scheme is sufficient for English and Western European languages but not large enough for Asian and other languages that use different alphabets. • Unicode – 16-bit coding scheme that has the capacity of representing more than 65,000 characters and symbols. - implement in several operating system such as Window, Mac OS and Linux. • Unicode-enable programming languages and software include Java, XML, Microsoft Office and Oracle
  • 4.
  • 5. How characters are converted? 1. Press a key on keyboard. 2. Chip in the keyboard converts the key’s electronic signal into a special code that is sent to the system unit. 3. System unit converts the code into ASCII binary code and store it in memory for processing. 4. Every character is converted to its corresponding byte and process the data. 5. Software converts the byte into number, letters or other character that recognize by human is then displayed on screen.