SlideShare a Scribd company logo
1 of 6
•   Computer recognize only two discrete state: on and off
    -because computers are electronic devices powered by electricity, which
     also has only two state on and off.
•   Digit 0 represents the electronic state of off
•   Digit 1 represents the electronic state of on
•   Binary system – a number system that has just to unique digits 0 and 1
    called bits.
•   Bit – smallest unit of data the computer can process.
•   Byte – grouped by 8 bits together
           - provides enough different combination of 0s and 1s to represent 256
             individual characters. (numbers, uppercase & lowercase letters of
             alphabet, punctuation marks and others)
•   Coding scheme – combination of 0s and 1s that represent characters are
             defined by patterns.
•   ASCII (American Standard Code for Information Interchange)
     - most widely used coding scheme to represent data
•   ASCII coding scheme is sufficient for English and Western European
    languages but not large enough for Asian and other languages that use
    different alphabets.
•   Unicode – 16-bit coding scheme that has the capacity of representing more
    than 65,000 characters and symbols.
      - implement in several operating system such as Window, Mac OS and
         Linux.
•   Unicode-enable programming languages and software include Java, XML,
    Microsoft Office and Oracle
How characters are converted?
1.   Press a key on keyboard.
2.   Chip in the keyboard converts the key’s electronic signal into a special
     code that is sent to the system unit.
3.   System unit converts the code into ASCII binary code and store it in
     memory for processing.
4.   Every character is converted to its corresponding byte and process the
     data.
5.   Software converts the byte into number, letters or other character that
     recognize by human is then displayed on screen.
data representation

More Related Content

Viewers also liked

Viewers also liked (18)

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
Unicode 101
Unicode 101Unicode 101
Unicode 101
 
Unicode
UnicodeUnicode
Unicode
 
W 9 numbering system
W 9 numbering systemW 9 numbering system
W 9 numbering system
 
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, UnicodeOracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
Oracle Globalization Support, NLS_LENGTH_SEMANTICS, Unicode
 
Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)
 
Fundamental Unicode in Perl
Fundamental Unicode in PerlFundamental Unicode in Perl
Fundamental Unicode in Perl
 
Coding system
Coding systemCoding system
Coding system
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Unicode
UnicodeUnicode
Unicode
 
Unicode
UnicodeUnicode
Unicode
 
Unicode
UnicodeUnicode
Unicode
 
Ch 4 ict in-day2_day_life
Ch 4 ict in-day2_day_lifeCh 4 ict in-day2_day_life
Ch 4 ict in-day2_day_life
 
Ict – information & communication technology
Ict – information & communication technologyIct – information & communication technology
Ict – information & communication technology
 
Curriculum development at primary and secondary level
Curriculum development at primary and secondary levelCurriculum development at primary and secondary level
Curriculum development at primary and secondary level
 
21st Century Education
21st Century Education21st Century Education
21st Century Education
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 

Similar to data representation

Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer systemmeisaina
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesMilind Patil
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptAlula Tafere
 
Bank Exam Computer Awareness
Bank Exam Computer AwarenessBank Exam Computer Awareness
Bank Exam Computer AwarenessIbps Exam
 
Compgenerations pented
Compgenerations pentedCompgenerations pented
Compgenerations pentedSajib
 
Comp conn 3 bits and bytes
Comp conn 3 bits and bytesComp conn 3 bits and bytes
Comp conn 3 bits and bytesallsaintstech
 
Lesson 17- Representing text
Lesson 17- Representing textLesson 17- Representing text
Lesson 17- Representing textSuraj Motee
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction iAhmed Saber
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingeysipi
 
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdfCh 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdfA23AyushRajBaranwal
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwareK. A. M Lutfullah
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of ComputersAnkur Kumar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 

Similar to data representation (20)

Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Bank Exam Computer Awareness
Bank Exam Computer AwarenessBank Exam Computer Awareness
Bank Exam Computer Awareness
 
Topic 2.3 (1)
Topic 2.3 (1)Topic 2.3 (1)
Topic 2.3 (1)
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
Compgenerations pented
Compgenerations pentedCompgenerations pented
Compgenerations pented
 
Comp conn 3 bits and bytes
Comp conn 3 bits and bytesComp conn 3 bits and bytes
Comp conn 3 bits and bytes
 
Lesson 17- Representing text
Lesson 17- Representing textLesson 17- Representing text
Lesson 17- Representing text
 
Introduction to Software Engineering: Lecture 1 introduction i
Introduction to Software Engineering: Lecture 1  introduction iIntroduction to Software Engineering: Lecture 1  introduction i
Introduction to Software Engineering: Lecture 1 introduction i
 
Adv uni
Adv uniAdv uni
Adv uni
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
 
Ch 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdfCh 02 Encoding & Number System.pdf
Ch 02 Encoding & Number System.pdf
 
09 Tait
09 Tait09 Tait
09 Tait
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 

More from chrispaul8676 (15)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software theft
Software theftSoftware theft
Software theft
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

data representation

  • 1.
  • 2. Computer recognize only two discrete state: on and off -because computers are electronic devices powered by electricity, which also has only two state on and off. • Digit 0 represents the electronic state of off • Digit 1 represents the electronic state of on • Binary system – a number system that has just to unique digits 0 and 1 called bits. • Bit – smallest unit of data the computer can process. • Byte – grouped by 8 bits together - provides enough different combination of 0s and 1s to represent 256 individual characters. (numbers, uppercase & lowercase letters of alphabet, punctuation marks and others) • Coding scheme – combination of 0s and 1s that represent characters are defined by patterns.
  • 3. ASCII (American Standard Code for Information Interchange) - most widely used coding scheme to represent data • ASCII coding scheme is sufficient for English and Western European languages but not large enough for Asian and other languages that use different alphabets. • Unicode – 16-bit coding scheme that has the capacity of representing more than 65,000 characters and symbols. - implement in several operating system such as Window, Mac OS and Linux. • Unicode-enable programming languages and software include Java, XML, Microsoft Office and Oracle
  • 4.
  • 5. How characters are converted? 1. Press a key on keyboard. 2. Chip in the keyboard converts the key’s electronic signal into a special code that is sent to the system unit. 3. System unit converts the code into ASCII binary code and store it in memory for processing. 4. Every character is converted to its corresponding byte and process the data. 5. Software converts the byte into number, letters or other character that recognize by human is then displayed on screen.