SlideShare a Scribd company logo
1
Chapter # 10
Data Transfer
Prepared by :Sir Abdul Wajid
2
Data transfer
 Users often need to transfer data
between software packages or
computers.
 Until relatively recently this was difficult
to achieve, but the increasing use of
computers and the growth of ICT has
forced software designers to make this
much easier.
 File conversion from older to newer
versions of the software.
3
File Conversion
 File conversion is an important part of computing
 If you r using new software version then there is a need that this
software will read the files from the old database.
 It means that old data can be converted for use on newer
systems.
 This saves considerable time because it avoids users having to re-
enter existing data onto a new system.
 It is always important to make sure that any new software were buy can
read your old files.
 Problems might arise with file conversion if the data is very old or
is formatted for a system that not longer exists.
 However, most newer version of software are usually capable of
reading data from older versions (e.g. Word97 files can be read
by Word2002)
 Most database, spreadsheet and word processing files can be read by
other packages as well .
 However it is always important to check that this compatibility
between software packages and data works.
4
ASCII
 ASCII is the acronym for American Standard
Code for Information Interchange.
 ASCII is a world-wide standard code for
representing characters (letters, numbers etc.)
as binary code.
 Before its introduction, it was almost
impossible to transfer data between software
packages or computers.
 For example the letter A has the ASCII code
0100 0001 and B is 0100 0010.
5
An example of ASCII
 HELLO! Is represented by the following
ASCII code:
 H 0100 1000
 E0100 0101
 L0100 1100
 L0100 1100
 O 0100 1111
 ! 0010 0001
6
ASCII Files
 AMERCIAN STANDARD CODE FOR
INFORMATION INTERCHANGE.
 This code is representing characters ( letters,
numbers) as binary codes.
 All computers can store data as ASCII code and a
file used to hold ASCII code is called ASCII file.
 The 8 bit binary codes used to hold the letters of
alphabet.
 Let suppose ASCII code of character A is
A 01000001
7
Transferring files between
word processors
 The most common type of the file transfer is
between different word processors.
 In large organizations people use different
versions of word processors, so there is a
need such a word processor which can be
compatible.
 The only way to transfer text between
different word processors is to store
everything as ASCII file.
8
Comma separated Variables
 One common file format is “Comma
Separated Variables ” as CSV
 The CSV File format is useful because it is
possible to transfer files.
 Files in this format can be read by most
spreadsheets and databases.
9
File Handling Packages
 Backing storage devices such as disk drives are able to store
files outside the CPU.
 These files could be program files which holds the series of
instruction then it will perform a useful tasks.
 We need to perform file processes such as deleting, copying or
merging files.
 If we want to say, delete or copy a large number of files then
there is a need a special software called the file packages.
 Example:
 A file used to hold a drawing you have drawn using a drawing
paint.
10
Data/File Compression
 Special software is able to reduce the size of
files to about one quarter of their size.
 Zip Files are often use for that purpose
 You can also unzip or decompress the files.
 Program and data files are often compressed
before they are sent over the internet.
11
Analog computers
 It provides continuous value
 It represents physical quantities in the form of
waves
 It has no state
 It has low memory
 It is difficult to use
 It is used in engineering and science
 However, although analogue computers are
quite rare they do perform certain functions
better than digital computers (e.g. controlling
manufacturing processes in a factory; certain
type of modelling).
12
Examples
 Thermometer
 Analog Clocks
 Position of compass dial
 Room light dimmer switch
 Speed of the car
 Petrol Stations
13
Digital computers
 It provides us discrete values
 It represent physical values with help of
symbols or numbers
 It has two states ON and OFF
 It has big memory
 These are easy to use
 It is used in all field of life
14
Examples
 Digital clocks
 Calculators
 Score board
 Bar codes
 Traffic light sequence
15
Analog to Digital conversion
and vice versa
 In chemical factories ,the processes used to
make chemicals are usually controlled with
the help of computers. The signals from a
temperature sensor is a continually changing
analog to Digital (ADC) .
 The computer then control the process by
outputting the digital-analog converter(DAC)
 A modem is another example
16
Modulator
 In modem it is used to convert the binary
digits from a digital computer into an analog
signal that may be passed along telephone
wires.
17
Demodulator
 Wires convert the analogue signal back into a
digital one that the computer is able to
understand.
18
Sound Sampling
 The sound cards listens to the sound and
takes a measurement of the height of the
signal many times a second. The
measurement called sound sampling.
 The sampling rate is the number of times the
sample is measured per second called it is
kilohertz (KHz).
 The higher the sampling rate the better the
sound reproduction.

More Related Content

What's hot

computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detail
sonykhan3
 
Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
harryhickford
 
64bitsprocessor
64bitsprocessor64bitsprocessor
64bitsprocessor
sagar chauhan
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
ali00061
 
Reprint - 64 bit computing
Reprint - 64 bit computingReprint - 64 bit computing
Reprint - 64 bit computing
Chuck Thompson
 
Electronic Data Processing
Electronic Data ProcessingElectronic Data Processing
Electronic Data Processing
Anjan Mahanta
 
Internal components 2
Internal components 2Internal components 2
Internal components 2BenRB
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Bits and bytes
Bits and bytesBits and bytes
Bits and bytes
ntwali obadiah
 
Internet
InternetInternet
Internet
Alisha Korpal
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1AmieBodkin
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
SaraswathiRamalingam
 
Components of a computer-Unit-2
Components of a computer-Unit-2Components of a computer-Unit-2

What's hot (15)

computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detail
 
Harry hickford components for a computer
Harry hickford components for a computer Harry hickford components for a computer
Harry hickford components for a computer
 
64bitsprocessor
64bitsprocessor64bitsprocessor
64bitsprocessor
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
 
Reprint - 64 bit computing
Reprint - 64 bit computingReprint - 64 bit computing
Reprint - 64 bit computing
 
Electronic Data Processing
Electronic Data ProcessingElectronic Data Processing
Electronic Data Processing
 
Internal components 2
Internal components 2Internal components 2
Internal components 2
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Bits and bytes
Bits and bytesBits and bytes
Bits and bytes
 
Internet
InternetInternet
Internet
 
Cisco: Unit 3 P1
Cisco: Unit 3 P1Cisco: Unit 3 P1
Cisco: Unit 3 P1
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Components of a computer-Unit-2
Components of a computer-Unit-2Components of a computer-Unit-2
Components of a computer-Unit-2
 
Chapter 1r
Chapter 1rChapter 1r
Chapter 1r
 

Similar to Ch10 data transfer

Technology Term Definition By Muneeb-Ahmad
Technology Term Definition  By Muneeb-AhmadTechnology Term Definition  By Muneeb-Ahmad
Technology Term Definition By Muneeb-Ahmad
Muneeb Ahmad
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)  Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)
Kamleshwar Pandey
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
EstelaJeffery653
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
Job Thomas
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentials
Sherri Jackson
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalssaoud88
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014
Lucky Saini
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
ehillpamlico
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docx
SamyaGufoor
 
Basic computer fundamentals (1)
Basic computer fundamentals (1)Basic computer fundamentals (1)
Basic computer fundamentals (1)
Valli Kutty
 
Computer Systems Credit
Computer Systems CreditComputer Systems Credit
Computer Systems Creditmrcarty
 
Unit 2 Foc
Unit 2 FocUnit 2 Foc
Unit 2 Foc
JAYA
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basicJiian Francisco
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
LordelynFrancoYusi
 
Computer Basic
Computer BasicComputer Basic

Similar to Ch10 data transfer (20)

Technology Term Definition By Muneeb-Ahmad
Technology Term Definition  By Muneeb-AhmadTechnology Term Definition  By Muneeb-Ahmad
Technology Term Definition By Muneeb-Ahmad
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)  Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentials
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docx
 
Basic computer fundamentals (1)
Basic computer fundamentals (1)Basic computer fundamentals (1)
Basic computer fundamentals (1)
 
Computer Systems Credit
Computer Systems CreditComputer Systems Credit
Computer Systems Credit
 
Unit 2 Foc
Unit 2 FocUnit 2 Foc
Unit 2 Foc
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 

More from Khan Yousafzai

09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operationKhan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and designKhan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solvingKhan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic officeKhan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your healthKhan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of itKhan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections actKhan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information systemKhan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting dataKhan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operationsKhan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your dataKhan Yousafzai
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the lawKhan Yousafzai
 

More from Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
23 simulations
23   simulations23   simulations
23 simulations
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 

Recently uploaded

Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 

Recently uploaded (13)

Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 

Ch10 data transfer

  • 1. 1 Chapter # 10 Data Transfer Prepared by :Sir Abdul Wajid
  • 2. 2 Data transfer  Users often need to transfer data between software packages or computers.  Until relatively recently this was difficult to achieve, but the increasing use of computers and the growth of ICT has forced software designers to make this much easier.  File conversion from older to newer versions of the software.
  • 3. 3 File Conversion  File conversion is an important part of computing  If you r using new software version then there is a need that this software will read the files from the old database.  It means that old data can be converted for use on newer systems.  This saves considerable time because it avoids users having to re- enter existing data onto a new system.  It is always important to make sure that any new software were buy can read your old files.  Problems might arise with file conversion if the data is very old or is formatted for a system that not longer exists.  However, most newer version of software are usually capable of reading data from older versions (e.g. Word97 files can be read by Word2002)  Most database, spreadsheet and word processing files can be read by other packages as well .  However it is always important to check that this compatibility between software packages and data works.
  • 4. 4 ASCII  ASCII is the acronym for American Standard Code for Information Interchange.  ASCII is a world-wide standard code for representing characters (letters, numbers etc.) as binary code.  Before its introduction, it was almost impossible to transfer data between software packages or computers.  For example the letter A has the ASCII code 0100 0001 and B is 0100 0010.
  • 5. 5 An example of ASCII  HELLO! Is represented by the following ASCII code:  H 0100 1000  E0100 0101  L0100 1100  L0100 1100  O 0100 1111  ! 0010 0001
  • 6. 6 ASCII Files  AMERCIAN STANDARD CODE FOR INFORMATION INTERCHANGE.  This code is representing characters ( letters, numbers) as binary codes.  All computers can store data as ASCII code and a file used to hold ASCII code is called ASCII file.  The 8 bit binary codes used to hold the letters of alphabet.  Let suppose ASCII code of character A is A 01000001
  • 7. 7 Transferring files between word processors  The most common type of the file transfer is between different word processors.  In large organizations people use different versions of word processors, so there is a need such a word processor which can be compatible.  The only way to transfer text between different word processors is to store everything as ASCII file.
  • 8. 8 Comma separated Variables  One common file format is “Comma Separated Variables ” as CSV  The CSV File format is useful because it is possible to transfer files.  Files in this format can be read by most spreadsheets and databases.
  • 9. 9 File Handling Packages  Backing storage devices such as disk drives are able to store files outside the CPU.  These files could be program files which holds the series of instruction then it will perform a useful tasks.  We need to perform file processes such as deleting, copying or merging files.  If we want to say, delete or copy a large number of files then there is a need a special software called the file packages.  Example:  A file used to hold a drawing you have drawn using a drawing paint.
  • 10. 10 Data/File Compression  Special software is able to reduce the size of files to about one quarter of their size.  Zip Files are often use for that purpose  You can also unzip or decompress the files.  Program and data files are often compressed before they are sent over the internet.
  • 11. 11 Analog computers  It provides continuous value  It represents physical quantities in the form of waves  It has no state  It has low memory  It is difficult to use  It is used in engineering and science  However, although analogue computers are quite rare they do perform certain functions better than digital computers (e.g. controlling manufacturing processes in a factory; certain type of modelling).
  • 12. 12 Examples  Thermometer  Analog Clocks  Position of compass dial  Room light dimmer switch  Speed of the car  Petrol Stations
  • 13. 13 Digital computers  It provides us discrete values  It represent physical values with help of symbols or numbers  It has two states ON and OFF  It has big memory  These are easy to use  It is used in all field of life
  • 14. 14 Examples  Digital clocks  Calculators  Score board  Bar codes  Traffic light sequence
  • 15. 15 Analog to Digital conversion and vice versa  In chemical factories ,the processes used to make chemicals are usually controlled with the help of computers. The signals from a temperature sensor is a continually changing analog to Digital (ADC) .  The computer then control the process by outputting the digital-analog converter(DAC)  A modem is another example
  • 16. 16 Modulator  In modem it is used to convert the binary digits from a digital computer into an analog signal that may be passed along telephone wires.
  • 17. 17 Demodulator  Wires convert the analogue signal back into a digital one that the computer is able to understand.
  • 18. 18 Sound Sampling  The sound cards listens to the sound and takes a measurement of the height of the signal many times a second. The measurement called sound sampling.  The sampling rate is the number of times the sample is measured per second called it is kilohertz (KHz).  The higher the sampling rate the better the sound reproduction.