SlideShare a Scribd company logo
1 of 15
Download to read offline
MEMORY
128 64 32 16 8 4 2 1
+-+ +-+ +-+ +-+ +-+ +-+ +-+ +-+
| | | | | | | | | | | | | | | |
+-+ +-+ +-+ +-+ +-+ +-+ +-+ +-+
Each 'box' represents a single binary digit and its position in a
storage location, known as 'memory'. The 'value' of a binary digit in
any position is shown.
A 32-bit computer processes four bytes at a time
BITS & BYTES
1 BIT - stands for Binary digIT
1 Byte = 8 bits
½ byte = 1 nibble = 4 bits
2x byte = 1 word = 16 bits
2x word = 1 long word = 32 bits
1KByte = 1,024 bytes = 210
1MByte = 1,048,576 bytes = 220
1GByte = 230
bytes
1TByte = 240
bytes
Memory Addressing
The ability of a computer to access any particular area of its memory
is referred to as "addressing".
Addressing is a function of the number of microprocessor address
lines on its "BUS", and is therefore, hardware dependant.
● 8088/86 cpu can address up to 1MB with its 20 address lines
● 80286 cpu can address up to 16MB with its 24 address lines
● 80386 cpu can address up to 4GB with its 32 address lines
Intel® Desktop Processor Comparison Chart
http://compare.intel.com/PCC/default.aspx?familyid=1&culture=en-US
EXTENDED MEMORY MAP
2^32 4GB +---------+
| | This shows a 'grid' of
| | memory 'cells', 8-bits
| | wide by 4GB long.
2^24 16MB| |
| |
2^20 1MB |---------| FFFFF
|---------| E0000
|---------| C0000
640KB |---------| A0000
| |
| |
0KB +---------+ 00000
INTERPRETATION OF MEMORY CONTENTS
Memory cells store voltages - Interpreted as 0 or 1
Combinations REPRESENT numeric data ie. Letters, numbers,
punctuation marks, graphics characters
Memory is not restricted to using numeric coding
Bytes can represent:
● CPU Instruction codes
● alpha numeric characters (word processors)
● pure binary No's
It's all down to interpretation with the software application.
ASCII
AMERICAN STANDARD CODE FOR INFORMATION
INTERCHANGE
ASCII is a coding standard which means that data is stored
according to the ascii standards rules.
Original ASCII, 128 codes (0 to127) represented
• English alphabet
• punctuation
• control codes
Now 256 codes (0---->255)
= orig ASCII + 128 codes called extended character set
European characters
Graphic ''
Scientific '‘
Each keyboard key has an ASCII code assigned eg: 128 is stored
as 3 BYTES OF ASCII DATA
1-------> 49
2-------> 50
8-------> 56
whereas (pure) binary data would be stored as 1 byte
A.S.C.I.I. Coding
There are 255 characters available to 8 bits. 0 isn't used.
Only the numbers from 32 to 126 (20 to 7E hex) are defined as
*printable* characters (the others are defined as control codes)
0 1 2 3 4 5 6 7 8 9 A B C D E F
---------------------------------
2 | ! " # $ % & ' ( ) * + , - . /
3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4 | @ A B C D E F G H I J K L M N O
5 | P Q R S T U V W X Y Z [  ] ^ _
6 | ` a b c d e f g h i j k l m n o
7 | p q r s t u v w x y z { | } ~
http://en.wikipedia.org/wiki/ASCII
http://www.asciitable.com/
Microsoft file names
Windows 9x onwards allows long file names and control characters
to be used.
When transferring files to INTERNET systems, the filenames have
to be re-formatted to comply with UNIX standards.
No character is allowed which the system uses for commands or
other functions, such as , /, ., etc. The underscore character _ is
accepted as a separator as a space cannot be used.
Older MS-DOS formatted filenames can contain no more than 8
characters, and these must not contain any of the command
characters.
File extensions
● The file name is followed by a dot . which separates it from its
extension.
● The file extension is 3 characters long and describes the type of
file.
*.COM - Command file. Runs from the DOS prompt. Small file =<64 KB
*.EXE - Executable file. Larger file >= 64 KB
*.SYS - System file. Installed in memory using an installation program.
*.BAT - Batch File. Contains series of text commands batched together.
Other extensions are produced typically by application software for their data
files, eg .doc, .html, etc.
(The * is used here to represent any filename)
Windows drive storage
The DOS system uses drive letters, such as
a: and b: for floppy disk drives
c: for the hard disk drive
d: or e: for a CD-ROM drive
f: onwards for network drives

|_ a:____
|_ b: |_ subdirectories
|_ c: |_
|_ d: |_
|_ e:
|_ f:____
|_
|_ subdirectories
UNIX drive storage
● There are no drive letters.
● The directory structure starts from the 'root' where
everything is seen as a file.
● Directories are simply 'mounted' into another directory.
● Internet URLs follow Unix filename conventions
Windows: k:drivespace
Unix: /home/user/webspace/images
Internet:
http://news.bbc.co.uk/1/hi/sci/tech/default.stm
+-----+
| / |
+--+--+
|
+--------+---+-----+--------+
| | | |
+--+--+ +--+--+ +---+--+ +--+--+
| bin | | usr | | home | | etc |
+-----+ +-----+ +--+---+ +-----+
|
+-------------+-----+
| |
+---+--+ +---+--+
| FRED | | DAVE |
+---+--+ +---+--+
| |
+-----+---+ +----+-----+
| | | |
+---+--+ +---+--+ +--+---+ +---+--+
| work | | web | | work | | web |
+------+ +------+ +------+ +------+
Commercial Web filespace
• ISP webspace hosting your own web domain, the industry standard access tool is FTP
• The web root, eg http://www.somenet.com will be kept in a subdirectory
• Every ISP puts this subdirectory in different places, eg.
http://splicehost.com/faq.html
PROGRAMS' LOCATION
- What is the path to PERL? /usr/bin/perl
- What is the path to SENDMAIL? /usr/sbin/sendmail
- What is the path to DATE? /bin/date
- What is the path of my files? /home/yourusername
- Web read-able files are in /home/username/public_html
However, you are only allowed to work from /public_html, and /home/username
is kept invisible to you.
NOTE: DRIVE LETTERS NEVER APPEAR - ONLY UNIX DIRECTORIES
Internet file
naming rules are
UNIX

More Related Content

What's hot (17)

Root file system
Root file systemRoot file system
Root file system
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
 
A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)
 
Nithi
NithiNithi
Nithi
 
MS-DOS
MS-DOSMS-DOS
MS-DOS
 
04 cache memory
04 cache memory04 cache memory
04 cache memory
 
File Management
File ManagementFile Management
File Management
 
cache memory
cache memorycache memory
cache memory
 
DBMS
DBMSDBMS
DBMS
 
File system implementation
File system implementationFile system implementation
File system implementation
 
Ext2
Ext2Ext2
Ext2
 
What is Cache and how it works
What is Cache and how it worksWhat is Cache and how it works
What is Cache and how it works
 
Dos
DosDos
Dos
 
Memory map
Memory mapMemory map
Memory map
 
Domain name system
Domain name systemDomain name system
Domain name system
 
File management
File managementFile management
File management
 
Cache recap
Cache recapCache recap
Cache recap
 

Viewers also liked

Training Effectiveness
Training EffectivenessTraining Effectiveness
Training EffectivenessAnubha Walia
 
Factors influencing people in extreme recreation activities participation2
Factors influencing people in extreme recreation activities participation2Factors influencing people in extreme recreation activities participation2
Factors influencing people in extreme recreation activities participation2Adda Syuhada
 
Effectiveness of Organizational Training
Effectiveness of Organizational TrainingEffectiveness of Organizational Training
Effectiveness of Organizational TrainingJorge Boria
 
The effectiveness of training
The effectiveness of trainingThe effectiveness of training
The effectiveness of training30397
 
Effects of training and Factors Affecting Fitness
Effects of training and Factors Affecting FitnessEffects of training and Factors Affecting Fitness
Effects of training and Factors Affecting FitnessApril Centes
 
Measuring the Effectiveness of Training - Myth or Reality?
Measuring the Effectiveness of Training - Myth or Reality?Measuring the Effectiveness of Training - Myth or Reality?
Measuring the Effectiveness of Training - Myth or Reality?Accord
 
Organizational Development and Leadership Effectiveness
Organizational Development and Leadership EffectivenessOrganizational Development and Leadership Effectiveness
Organizational Development and Leadership EffectivenessRamil Gallardo
 
Effectiveness of training and development
Effectiveness of training and developmentEffectiveness of training and development
Effectiveness of training and developmentRatheesh R
 
Organizational Effectiveness
Organizational EffectivenessOrganizational Effectiveness
Organizational EffectivenessDewasish Ghoshal
 
Core 2 Factors affecting performance Aerobic training
Core 2 Factors affecting performance Aerobic trainingCore 2 Factors affecting performance Aerobic training
Core 2 Factors affecting performance Aerobic trainingmacca60
 
Internal Factors Affecting Business Environment . ppt
Internal Factors Affecting Business Environment . pptInternal Factors Affecting Business Environment . ppt
Internal Factors Affecting Business Environment . pptHarshil Shah
 

Viewers also liked (15)

Training Effectiveness
Training EffectivenessTraining Effectiveness
Training Effectiveness
 
Leader Effectiveness Training (L.E.T.) e-brochure
Leader Effectiveness Training (L.E.T.) e-brochureLeader Effectiveness Training (L.E.T.) e-brochure
Leader Effectiveness Training (L.E.T.) e-brochure
 
Factors influencing people in extreme recreation activities participation2
Factors influencing people in extreme recreation activities participation2Factors influencing people in extreme recreation activities participation2
Factors influencing people in extreme recreation activities participation2
 
Effectiveness of Organizational Training
Effectiveness of Organizational TrainingEffectiveness of Organizational Training
Effectiveness of Organizational Training
 
The effectiveness of training
The effectiveness of trainingThe effectiveness of training
The effectiveness of training
 
Effects of training and Factors Affecting Fitness
Effects of training and Factors Affecting FitnessEffects of training and Factors Affecting Fitness
Effects of training and Factors Affecting Fitness
 
Training effectiveness
Training effectivenessTraining effectiveness
Training effectiveness
 
Measuring the Effectiveness of Training - Myth or Reality?
Measuring the Effectiveness of Training - Myth or Reality?Measuring the Effectiveness of Training - Myth or Reality?
Measuring the Effectiveness of Training - Myth or Reality?
 
Organizational Development and Leadership Effectiveness
Organizational Development and Leadership EffectivenessOrganizational Development and Leadership Effectiveness
Organizational Development and Leadership Effectiveness
 
Effectiveness of training and development
Effectiveness of training and developmentEffectiveness of training and development
Effectiveness of training and development
 
Measuring Training Effectiveness
Measuring Training EffectivenessMeasuring Training Effectiveness
Measuring Training Effectiveness
 
Organizational Effectiveness
Organizational EffectivenessOrganizational Effectiveness
Organizational Effectiveness
 
Core 2 Factors affecting performance Aerobic training
Core 2 Factors affecting performance Aerobic trainingCore 2 Factors affecting performance Aerobic training
Core 2 Factors affecting performance Aerobic training
 
Internal Factors Affecting Business Environment . ppt
Internal Factors Affecting Business Environment . pptInternal Factors Affecting Business Environment . ppt
Internal Factors Affecting Business Environment . ppt
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Development
 

Similar to Memory and File Formats Explained

SIMD Processing Using Compiler Intrinsics
SIMD Processing Using Compiler IntrinsicsSIMD Processing Using Compiler Intrinsics
SIMD Processing Using Compiler IntrinsicsRichard Thomson
 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLsadil raja
 
Session01_Intro.pdf
Session01_Intro.pdfSession01_Intro.pdf
Session01_Intro.pdfRahnerJames
 
IT Book of Knowledge
IT Book of KnowledgeIT Book of Knowledge
IT Book of KnowledgePhil Primeau
 
RHCSA EX200 - Summary
RHCSA EX200 - SummaryRHCSA EX200 - Summary
RHCSA EX200 - SummaryNugroho Gito
 
Slideshare - PCIe
Slideshare - PCIeSlideshare - PCIe
Slideshare - PCIeJin Wu
 
Lamp ppt
Lamp pptLamp ppt
Lamp pptReka
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsAniekan Akpaffiong
 
Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interviewSwapnil Kapate
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer ConceptsPhoebe Kim
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs RevnorthVU
 
Data Storage
Data StorageData Storage
Data Storageadil raja
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PEstelaJeffery653
 
other-architectures.ppt
other-architectures.pptother-architectures.ppt
other-architectures.pptJaya Chavan
 

Similar to Memory and File Formats Explained (20)

Memory
MemoryMemory
Memory
 
SIMD Processing Using Compiler Intrinsics
SIMD Processing Using Compiler IntrinsicsSIMD Processing Using Compiler Intrinsics
SIMD Processing Using Compiler Intrinsics
 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLs
 
Session01_Intro.pdf
Session01_Intro.pdfSession01_Intro.pdf
Session01_Intro.pdf
 
Technical presentation
Technical presentationTechnical presentation
Technical presentation
 
HPC Essentials
HPC EssentialsHPC Essentials
HPC Essentials
 
IT Book of Knowledge
IT Book of KnowledgeIT Book of Knowledge
IT Book of Knowledge
 
Linuxs1
Linuxs1Linuxs1
Linuxs1
 
RHCSA EX200 - Summary
RHCSA EX200 - SummaryRHCSA EX200 - Summary
RHCSA EX200 - Summary
 
Slideshare - PCIe
Slideshare - PCIeSlideshare - PCIe
Slideshare - PCIe
 
Lamp ppt
Lamp pptLamp ppt
Lamp ppt
 
Laptop Basic Knowledge
Laptop Basic KnowledgeLaptop Basic Knowledge
Laptop Basic Knowledge
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
 
Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interview
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer Concepts
 
Int Cs Rev
Int Cs RevInt Cs Rev
Int Cs Rev
 
Data Storage
Data StorageData Storage
Data Storage
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
 
other-architectures.ppt
other-architectures.pptother-architectures.ppt
other-architectures.ppt
 
Computer components
Computer componentsComputer components
Computer components
 

More from adil raja

A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specificationadil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehiclesadil raja
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystifiedadil raja
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)adil raja
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Researchadil raja
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocoladil raja
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Socketsadil raja
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Executionadil raja
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistanadil raja
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousingadil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPadil raja
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specificationsadil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
 

More from adil raja (20)

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
 
Thesis
ThesisThesis
Thesis
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
 
VoIP
VoIPVoIP
VoIP
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 

Memory and File Formats Explained

  • 1. MEMORY 128 64 32 16 8 4 2 1 +-+ +-+ +-+ +-+ +-+ +-+ +-+ +-+ | | | | | | | | | | | | | | | | +-+ +-+ +-+ +-+ +-+ +-+ +-+ +-+ Each 'box' represents a single binary digit and its position in a storage location, known as 'memory'. The 'value' of a binary digit in any position is shown. A 32-bit computer processes four bytes at a time
  • 2. BITS & BYTES 1 BIT - stands for Binary digIT 1 Byte = 8 bits ½ byte = 1 nibble = 4 bits 2x byte = 1 word = 16 bits 2x word = 1 long word = 32 bits 1KByte = 1,024 bytes = 210 1MByte = 1,048,576 bytes = 220 1GByte = 230 bytes 1TByte = 240 bytes
  • 3. Memory Addressing The ability of a computer to access any particular area of its memory is referred to as "addressing". Addressing is a function of the number of microprocessor address lines on its "BUS", and is therefore, hardware dependant. ● 8088/86 cpu can address up to 1MB with its 20 address lines ● 80286 cpu can address up to 16MB with its 24 address lines ● 80386 cpu can address up to 4GB with its 32 address lines Intel® Desktop Processor Comparison Chart http://compare.intel.com/PCC/default.aspx?familyid=1&culture=en-US
  • 4. EXTENDED MEMORY MAP 2^32 4GB +---------+ | | This shows a 'grid' of | | memory 'cells', 8-bits | | wide by 4GB long. 2^24 16MB| | | | 2^20 1MB |---------| FFFFF |---------| E0000 |---------| C0000 640KB |---------| A0000 | | | | 0KB +---------+ 00000
  • 5. INTERPRETATION OF MEMORY CONTENTS Memory cells store voltages - Interpreted as 0 or 1 Combinations REPRESENT numeric data ie. Letters, numbers, punctuation marks, graphics characters Memory is not restricted to using numeric coding Bytes can represent: ● CPU Instruction codes ● alpha numeric characters (word processors) ● pure binary No's It's all down to interpretation with the software application.
  • 6. ASCII AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE ASCII is a coding standard which means that data is stored according to the ascii standards rules. Original ASCII, 128 codes (0 to127) represented • English alphabet • punctuation • control codes
  • 7. Now 256 codes (0---->255) = orig ASCII + 128 codes called extended character set European characters Graphic '' Scientific '‘ Each keyboard key has an ASCII code assigned eg: 128 is stored as 3 BYTES OF ASCII DATA 1-------> 49 2-------> 50 8-------> 56 whereas (pure) binary data would be stored as 1 byte
  • 8. A.S.C.I.I. Coding There are 255 characters available to 8 bits. 0 isn't used. Only the numbers from 32 to 126 (20 to 7E hex) are defined as *printable* characters (the others are defined as control codes) 0 1 2 3 4 5 6 7 8 9 A B C D E F --------------------------------- 2 | ! " # $ % & ' ( ) * + , - . / 3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ? 4 | @ A B C D E F G H I J K L M N O 5 | P Q R S T U V W X Y Z [ ] ^ _ 6 | ` a b c d e f g h i j k l m n o 7 | p q r s t u v w x y z { | } ~ http://en.wikipedia.org/wiki/ASCII http://www.asciitable.com/
  • 9. Microsoft file names Windows 9x onwards allows long file names and control characters to be used. When transferring files to INTERNET systems, the filenames have to be re-formatted to comply with UNIX standards. No character is allowed which the system uses for commands or other functions, such as , /, ., etc. The underscore character _ is accepted as a separator as a space cannot be used. Older MS-DOS formatted filenames can contain no more than 8 characters, and these must not contain any of the command characters.
  • 10. File extensions ● The file name is followed by a dot . which separates it from its extension. ● The file extension is 3 characters long and describes the type of file. *.COM - Command file. Runs from the DOS prompt. Small file =<64 KB *.EXE - Executable file. Larger file >= 64 KB *.SYS - System file. Installed in memory using an installation program. *.BAT - Batch File. Contains series of text commands batched together. Other extensions are produced typically by application software for their data files, eg .doc, .html, etc. (The * is used here to represent any filename)
  • 11. Windows drive storage The DOS system uses drive letters, such as a: and b: for floppy disk drives c: for the hard disk drive d: or e: for a CD-ROM drive f: onwards for network drives |_ a:____ |_ b: |_ subdirectories |_ c: |_ |_ d: |_ |_ e: |_ f:____ |_ |_ subdirectories
  • 12. UNIX drive storage ● There are no drive letters. ● The directory structure starts from the 'root' where everything is seen as a file. ● Directories are simply 'mounted' into another directory. ● Internet URLs follow Unix filename conventions Windows: k:drivespace Unix: /home/user/webspace/images Internet: http://news.bbc.co.uk/1/hi/sci/tech/default.stm
  • 13. +-----+ | / | +--+--+ | +--------+---+-----+--------+ | | | | +--+--+ +--+--+ +---+--+ +--+--+ | bin | | usr | | home | | etc | +-----+ +-----+ +--+---+ +-----+ | +-------------+-----+ | | +---+--+ +---+--+ | FRED | | DAVE | +---+--+ +---+--+ | | +-----+---+ +----+-----+ | | | | +---+--+ +---+--+ +--+---+ +---+--+ | work | | web | | work | | web | +------+ +------+ +------+ +------+
  • 14. Commercial Web filespace • ISP webspace hosting your own web domain, the industry standard access tool is FTP • The web root, eg http://www.somenet.com will be kept in a subdirectory • Every ISP puts this subdirectory in different places, eg. http://splicehost.com/faq.html PROGRAMS' LOCATION - What is the path to PERL? /usr/bin/perl - What is the path to SENDMAIL? /usr/sbin/sendmail - What is the path to DATE? /bin/date - What is the path of my files? /home/yourusername - Web read-able files are in /home/username/public_html However, you are only allowed to work from /public_html, and /home/username is kept invisible to you. NOTE: DRIVE LETTERS NEVER APPEAR - ONLY UNIX DIRECTORIES