SlideShare a Scribd company logo
COMPUTER AWARENESS
Abhishek Sonker
Overview
Computer awareness refers to a person's knowledge and understanding of computers, their components,
software, and their impact on various aspects of life and work. It involves being familiar with how computers
work, their history, and their practical applications. Computer awareness encompasses a range of topics,
including:
● Hardware: Physical components of a computer, such as the CPU, RAM, storage devices, motherboard,
and peripherals like keyboards and monitors.
● Software: Knowledge of computer programs and operating systems, including how to use them and
install/uninstall software.
● Basic Operations: Familiarity with basic computer operations like file management, using a web browser,
and navigating the user interface.
● Computer Security: Awareness of cybersecurity best practices, including protecting against viruses,
malware, and online threats.
● Digital Literacy: The ability to use digital tools and software for communication, productivity, and research
purposes.
● Programming: Understanding the fundamentals of programming languages and how to write, run, and
debug simple programs.
● Internet and Networking: Knowledge of how the internet works, including concepts like IP addresses,
DNS, and common networking protocols.
● Computer History: Awareness of the historical developments that have shaped the field of computing.
● Ethical and Social Implications: Understanding the ethical and societal issues related to computers,
including privacy concerns and the impact of technology on society.
● Emerging Technologies: Keeping up to date with the latest advancements in computer technology, such
as artificial intelligence, virtual reality, and blockchain.
Computer awareness is important in today's digital age, as computers are integral to many aspects of daily life,
work, and business. It empowers individuals to make informed decisions about technology, stay safe online, and
leverage the power of computers for various tasks and opportunities.
Topics to be covered
01 Number System
02 Arithmetic operations
03
Introduction to various categories
of computer language
04 Functional details of Input and
Output devices
05
Representation of Data (Digital
versus Analog, Number System –
Decimal, Binary & Hexadecimal)
06
Introduction to Data Processing
07
Concepts of files and its types
Number System
What is Number System?
➔ The technique to represent and work with numbers is called number system.
➔ Decimal number system is the most common number system
➔ It includes:
Base 2
Binary Number System
Having just two digits – 0 and 1
Octal Number System
Has eight digits – 0, 1, 2, 3, 4, 5, 6
and 7
Base 8
Decimal Number System
Having 10 digits from 0 to 9
Base 10
Hexadecimal Number System
Has 16 symbols – 0 to 9 and A to
F
Base 16
Binary Number System (Base 2)
★ Binary is a base-2 number system, meaning it uses only two digits: 0 and 1.
★ Each digit in a binary number represents a power of 2, with the rightmost digit
representing 20 (1), the next one 21 (2), the next 22 (4), and so on.
★ Binary is used in computers because digital electronic circuits can easily represent
and manipulate two states (0 and 1), making it ideal for storing and processing
data.
★ Each binary digit is also called a bit.
★ Binary number system is also positional value system, where each digit has a value
expressed in powers of 2, as displayed here.
25 24 23 22 21 20
★ the rightmost digit is called least significant bit (LSB) and leftmost digit is called
most significant bit (MSB).
★ And decimal equivalent of this number is sum of product of each digit with its
positional value.
110102 = 1×24 + 1×23 + 0×22 + 1×21 + 0×20
= 16 + 8 + 0 + 2 + 0
= 2610
1 1 0 1 0
MSB LSB
Chart for memory capacity conversion.
1 byte B 8 bits
1 Kilobytes KB 1024 bytes
1
Megabyte
MB 1024 KB
1 Gigabyte GB 1024 MB
1 Terabyte TB 1024 GB
1 Exabyte EB 1024 PB
1 Zettabyte 1024 EB
1
Yottabyte
YB 1024 ZB
Octal Number System (Base-8)
★ Octal uses eight digits: 0-7.
★ Has eight digits – 0, 1, 2, 3, 4, 5, 6 and 7
★ Octal number system is also a positional value system with where each digit has
its value expressed in powers of 8
★ Any octal number is sum of product of each digit with its positional value.
7268 = 7×82 + 2×81 + 6×80
= 448 + 16 + 6
= 47010
85 84 83 82 81 80
Decimal Number System (Base-10)
★ It uses ten digits: 0 through 9.
★ Each digit in a decimal number represents a power of 10, with the rightmost digit
representing 100 (1), the next 101 (10), the next 102 (100), and so on.
★ The value of 7 in all three numbers is different−
105 104 103 102 101 100
❖ In 734, value of 7 is 7 hundreds or 700 or 7 × 100 or 7 × 102
❖ In 971, value of 7 is 7 tens or 70 or 7 × 10 or 7 × 101
❖ In 207, value 0f 7 is 7 units or 7 or 7 × 1 or 7 × 100
Hexadecimal Number System (Base-16)
★ Uses 16 digits: 0-9 and A-F (where A=10, B=11, C=12, & so on till F).
★ It is often used in computing to represent binary values more concisely. Four
binary digits (bits) can be represented by a single hexadecimal digit.
★ For example, binary 1100 is represented as C in hexadecimal.
27FB16 = 2×163 + 7×162 + 15×161 + 10×160
= 8192 + 1792 + 240 +10
= 1023410
115 114 113 112 111 110
Number System Relationship
HEXADECIMAL DECIMAL OCTAL BINARY
0 0 0 0000
1 1 1 0001
2 2 2 0010
3 3 3 0011
4 4 4 0100
5 5 5 0101
6 6 6 0110
7 7 7 0111
HEXADECIMAL DECIMAL OCTAL BINARY
8 8 10 1000
9 9 11 1001
A 10 12 1010
B 11 13 1011
C 12 14 1100
D 13 15 1101
E 14 16 1110
F 15 17 1111
ASCII
ASCII, which stands for "American Standard Code for Information Interchange"
A computer understand all the letters, punctuation marks, math symbols, and special
signs used in English. When you put them all together, they're called alphanumeric
codes.
ASCII is a 7-bit code that has 128 (27) possible codes.
Here are the key points about ASCII:
★ 26 upper case letters
★ 26 lower case letters
★ 10 digits
★ 7 punctuation marks
★ 20 to 40 special characters
ASCII Code - Character to Binary
0 0011 0000
1 0011 0001
2 0011 0010
3 0011 0011
4 0011 0100
5 0011 0101
6 0011 0110
7 0011 0110
8 0011 1000
9 0011 1001
A 0100 0001
B 0100 0010
C 0100 0011
D 0100 0100
E 0100 0101
F 0100 0110
G 0100 0111
H 0100 1000
I 0100 1001
J 0100 1010
K 0100 1011
L 0100 1100
M 0100 1101
N 0100 1110
O 0100 1111
P 0101 0000
Q 0101 0001
R 0101 0010
S 0101 0011
T 0101 0100
U 0101 0101
V 0101 0110
W 0101 0111
X 0101 1000
Y 0101 1001
Z 0101 1010
a 0110 0001
b 0110 0010
c 0110 0011
d 0110 0100
e 0110 0101
f 0110 0110
g 0110 0110
h 0110 1000
i 0110 1001
j 0110 1010
k 0110 1011
l 0110 1100
m 0110 1101
n 0110 1110
o 0110 1111
p 0111 0000
q 0111 0001
r 0111 0010
s 0111 0011
t 0111 0100
u 0111 0101
v 0111 0110
w 0111 0111
x 0111 1000
y 0111 1001
z 0111 1010
: 0011 1010
; 0011 1011
? 0011 1111
. 0010 1110
, 0010 1111
! 0010 0001
‘ 0010 1100
“ 0010 0010
( 0010 1000
) 0010 1001
space 0010 0000
ISCII
★ Stands for Indian Script Code for Information Interchange.
★ Developed to support Indian languages on computer.
★ Supported Languages: Devanagari, Tamil, Bangla, Gujarati, Gurmukhi, Tamil,
Telugu, etc.
★ mostly used by government departments and before it could catch on, a new
universal encoding standard called Unicode was introduced.
UNICODE
★ Purpose: Unicode is like a universal language for computers, designed to work
with all kinds of writing systems.
★ Unique Codes: Each letter, symbol, or character gets its very own number, which
is different from the old ways where different systems could clash.
★ No Conflicts: Unicode's goal is to give a special number to every character, no
matter what computer or program you're using, and regardless of the language.
It's like a common code that everyone can understand.

More Related Content

Similar to COMPUTER AWARENESS.pptx

digital logic design number system
digital logic design number systemdigital logic design number system
digital logic design number system
Nallapati Anindra
 
21EC201– Digital Principles and system design.pptx
21EC201– Digital Principles and system design.pptx21EC201– Digital Principles and system design.pptx
21EC201– Digital Principles and system design.pptx
GobinathAECEJRF1101
 
Kaizen cso002 l1
Kaizen cso002 l1Kaizen cso002 l1
Kaizen cso002 l1asslang
 
DLD-Introduction.pptx
DLD-Introduction.pptxDLD-Introduction.pptx
DLD-Introduction.pptx
UzairAhmadWalana
 
Number Codes and Registers
Number Codes and RegistersNumber Codes and Registers
Number system
Number systemNumber system
Number system
Ashish Kumar Thakur
 
Number systems
Number systemsNumber systems
Number systemsKalaTecno
 
Digital Logic
Digital LogicDigital Logic
Digital Logic
NabeelaNousheen
 
Basics of Computer For Begginers
Basics of Computer For BegginersBasics of Computer For Begginers
Basics of Computer For Begginers
kavithapriya C J
 
Complement.pdf
Complement.pdfComplement.pdf
Complement.pdf
MICHAELJOHNPEDRASA1
 
2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx
DintlePhofu
 
Number_Systems (2).ppt
Number_Systems (2).pptNumber_Systems (2).ppt
Number_Systems (2).ppt
nivedita murugan
 
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptxUNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
KaameshwaranKaameshw
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptx
SachinKupade
 
IT (Information Technology) for the Manager
IT (Information Technology) for the ManagerIT (Information Technology) for the Manager
IT (Information Technology) for the Manager
Nir Caftori
 
ICT FIRST LECTURE.pptx
ICT FIRST LECTURE.pptxICT FIRST LECTURE.pptx
ICT FIRST LECTURE.pptx
julitapelovello
 
data representation
 data representation data representation
data representation
Haroon_007
 
Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...
Get & Spread Knowledge
 

Similar to COMPUTER AWARENESS.pptx (20)

digital logic design number system
digital logic design number systemdigital logic design number system
digital logic design number system
 
21EC201– Digital Principles and system design.pptx
21EC201– Digital Principles and system design.pptx21EC201– Digital Principles and system design.pptx
21EC201– Digital Principles and system design.pptx
 
Kaizen cso002 l1
Kaizen cso002 l1Kaizen cso002 l1
Kaizen cso002 l1
 
DLD-Introduction.pptx
DLD-Introduction.pptxDLD-Introduction.pptx
DLD-Introduction.pptx
 
Number Codes and Registers
Number Codes and RegistersNumber Codes and Registers
Number Codes and Registers
 
Number system
Number systemNumber system
Number system
 
Number systems
Number systemsNumber systems
Number systems
 
Digital Logic
Digital LogicDigital Logic
Digital Logic
 
Basics of Computer For Begginers
Basics of Computer For BegginersBasics of Computer For Begginers
Basics of Computer For Begginers
 
Lec 02
Lec 02Lec 02
Lec 02
 
Complement.pdf
Complement.pdfComplement.pdf
Complement.pdf
 
Number Systems
Number  SystemsNumber  Systems
Number Systems
 
2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx2022_ITN_Module_5.pptx
2022_ITN_Module_5.pptx
 
Number_Systems (2).ppt
Number_Systems (2).pptNumber_Systems (2).ppt
Number_Systems (2).ppt
 
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptxUNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
UNIT-I U20EST109 - PROBLEM SOLVING APPROACH - Copy (1).pptx
 
Programming with 8085.pptx
Programming with 8085.pptxProgramming with 8085.pptx
Programming with 8085.pptx
 
IT (Information Technology) for the Manager
IT (Information Technology) for the ManagerIT (Information Technology) for the Manager
IT (Information Technology) for the Manager
 
ICT FIRST LECTURE.pptx
ICT FIRST LECTURE.pptxICT FIRST LECTURE.pptx
ICT FIRST LECTURE.pptx
 
data representation
 data representation data representation
data representation
 
Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...
 

More from Abhishek Sonker

PERMUTATION & COMBINATION.pptx
PERMUTATION & COMBINATION.pptxPERMUTATION & COMBINATION.pptx
PERMUTATION & COMBINATION.pptx
Abhishek Sonker
 
Mixture & Alligation.pptx
Mixture & Alligation.pptxMixture & Alligation.pptx
Mixture & Alligation.pptx
Abhishek Sonker
 
PROFIT AND LOSS.pptx
PROFIT AND LOSS.pptxPROFIT AND LOSS.pptx
PROFIT AND LOSS.pptx
Abhishek Sonker
 
OPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptxOPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptx
Abhishek Sonker
 
COMPUTER HARDWARE AND SOFTWARE.pptx
COMPUTER HARDWARE  AND SOFTWARE.pptxCOMPUTER HARDWARE  AND SOFTWARE.pptx
COMPUTER HARDWARE AND SOFTWARE.pptx
Abhishek Sonker
 
History Of Computer.pptx
History Of Computer.pptxHistory Of Computer.pptx
History Of Computer.pptx
Abhishek Sonker
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
Abhishek Sonker
 

More from Abhishek Sonker (7)

PERMUTATION & COMBINATION.pptx
PERMUTATION & COMBINATION.pptxPERMUTATION & COMBINATION.pptx
PERMUTATION & COMBINATION.pptx
 
Mixture & Alligation.pptx
Mixture & Alligation.pptxMixture & Alligation.pptx
Mixture & Alligation.pptx
 
PROFIT AND LOSS.pptx
PROFIT AND LOSS.pptxPROFIT AND LOSS.pptx
PROFIT AND LOSS.pptx
 
OPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptxOPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptx
 
COMPUTER HARDWARE AND SOFTWARE.pptx
COMPUTER HARDWARE  AND SOFTWARE.pptxCOMPUTER HARDWARE  AND SOFTWARE.pptx
COMPUTER HARDWARE AND SOFTWARE.pptx
 
History Of Computer.pptx
History Of Computer.pptxHistory Of Computer.pptx
History Of Computer.pptx
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

COMPUTER AWARENESS.pptx

  • 2. Overview Computer awareness refers to a person's knowledge and understanding of computers, their components, software, and their impact on various aspects of life and work. It involves being familiar with how computers work, their history, and their practical applications. Computer awareness encompasses a range of topics, including: ● Hardware: Physical components of a computer, such as the CPU, RAM, storage devices, motherboard, and peripherals like keyboards and monitors. ● Software: Knowledge of computer programs and operating systems, including how to use them and install/uninstall software. ● Basic Operations: Familiarity with basic computer operations like file management, using a web browser, and navigating the user interface. ● Computer Security: Awareness of cybersecurity best practices, including protecting against viruses, malware, and online threats.
  • 3. ● Digital Literacy: The ability to use digital tools and software for communication, productivity, and research purposes. ● Programming: Understanding the fundamentals of programming languages and how to write, run, and debug simple programs. ● Internet and Networking: Knowledge of how the internet works, including concepts like IP addresses, DNS, and common networking protocols. ● Computer History: Awareness of the historical developments that have shaped the field of computing. ● Ethical and Social Implications: Understanding the ethical and societal issues related to computers, including privacy concerns and the impact of technology on society. ● Emerging Technologies: Keeping up to date with the latest advancements in computer technology, such as artificial intelligence, virtual reality, and blockchain. Computer awareness is important in today's digital age, as computers are integral to many aspects of daily life, work, and business. It empowers individuals to make informed decisions about technology, stay safe online, and leverage the power of computers for various tasks and opportunities.
  • 4. Topics to be covered 01 Number System 02 Arithmetic operations 03 Introduction to various categories of computer language 04 Functional details of Input and Output devices 05 Representation of Data (Digital versus Analog, Number System – Decimal, Binary & Hexadecimal) 06 Introduction to Data Processing 07 Concepts of files and its types
  • 6. What is Number System? ➔ The technique to represent and work with numbers is called number system. ➔ Decimal number system is the most common number system ➔ It includes: Base 2 Binary Number System Having just two digits – 0 and 1 Octal Number System Has eight digits – 0, 1, 2, 3, 4, 5, 6 and 7 Base 8 Decimal Number System Having 10 digits from 0 to 9 Base 10 Hexadecimal Number System Has 16 symbols – 0 to 9 and A to F Base 16
  • 7. Binary Number System (Base 2) ★ Binary is a base-2 number system, meaning it uses only two digits: 0 and 1. ★ Each digit in a binary number represents a power of 2, with the rightmost digit representing 20 (1), the next one 21 (2), the next 22 (4), and so on. ★ Binary is used in computers because digital electronic circuits can easily represent and manipulate two states (0 and 1), making it ideal for storing and processing data. ★ Each binary digit is also called a bit. ★ Binary number system is also positional value system, where each digit has a value expressed in powers of 2, as displayed here. 25 24 23 22 21 20
  • 8. ★ the rightmost digit is called least significant bit (LSB) and leftmost digit is called most significant bit (MSB). ★ And decimal equivalent of this number is sum of product of each digit with its positional value. 110102 = 1×24 + 1×23 + 0×22 + 1×21 + 0×20 = 16 + 8 + 0 + 2 + 0 = 2610 1 1 0 1 0 MSB LSB
  • 9. Chart for memory capacity conversion. 1 byte B 8 bits 1 Kilobytes KB 1024 bytes 1 Megabyte MB 1024 KB 1 Gigabyte GB 1024 MB 1 Terabyte TB 1024 GB 1 Exabyte EB 1024 PB 1 Zettabyte 1024 EB 1 Yottabyte YB 1024 ZB
  • 10. Octal Number System (Base-8) ★ Octal uses eight digits: 0-7. ★ Has eight digits – 0, 1, 2, 3, 4, 5, 6 and 7 ★ Octal number system is also a positional value system with where each digit has its value expressed in powers of 8 ★ Any octal number is sum of product of each digit with its positional value. 7268 = 7×82 + 2×81 + 6×80 = 448 + 16 + 6 = 47010 85 84 83 82 81 80
  • 11. Decimal Number System (Base-10) ★ It uses ten digits: 0 through 9. ★ Each digit in a decimal number represents a power of 10, with the rightmost digit representing 100 (1), the next 101 (10), the next 102 (100), and so on. ★ The value of 7 in all three numbers is different− 105 104 103 102 101 100 ❖ In 734, value of 7 is 7 hundreds or 700 or 7 × 100 or 7 × 102 ❖ In 971, value of 7 is 7 tens or 70 or 7 × 10 or 7 × 101 ❖ In 207, value 0f 7 is 7 units or 7 or 7 × 1 or 7 × 100
  • 12. Hexadecimal Number System (Base-16) ★ Uses 16 digits: 0-9 and A-F (where A=10, B=11, C=12, & so on till F). ★ It is often used in computing to represent binary values more concisely. Four binary digits (bits) can be represented by a single hexadecimal digit. ★ For example, binary 1100 is represented as C in hexadecimal. 27FB16 = 2×163 + 7×162 + 15×161 + 10×160 = 8192 + 1792 + 240 +10 = 1023410 115 114 113 112 111 110
  • 13. Number System Relationship HEXADECIMAL DECIMAL OCTAL BINARY 0 0 0 0000 1 1 1 0001 2 2 2 0010 3 3 3 0011 4 4 4 0100 5 5 5 0101 6 6 6 0110 7 7 7 0111 HEXADECIMAL DECIMAL OCTAL BINARY 8 8 10 1000 9 9 11 1001 A 10 12 1010 B 11 13 1011 C 12 14 1100 D 13 15 1101 E 14 16 1110 F 15 17 1111
  • 14. ASCII ASCII, which stands for "American Standard Code for Information Interchange" A computer understand all the letters, punctuation marks, math symbols, and special signs used in English. When you put them all together, they're called alphanumeric codes. ASCII is a 7-bit code that has 128 (27) possible codes.
  • 15. Here are the key points about ASCII: ★ 26 upper case letters ★ 26 lower case letters ★ 10 digits ★ 7 punctuation marks ★ 20 to 40 special characters
  • 16. ASCII Code - Character to Binary 0 0011 0000 1 0011 0001 2 0011 0010 3 0011 0011 4 0011 0100 5 0011 0101 6 0011 0110 7 0011 0110 8 0011 1000 9 0011 1001 A 0100 0001 B 0100 0010 C 0100 0011 D 0100 0100 E 0100 0101 F 0100 0110 G 0100 0111 H 0100 1000 I 0100 1001 J 0100 1010 K 0100 1011 L 0100 1100 M 0100 1101 N 0100 1110 O 0100 1111 P 0101 0000 Q 0101 0001 R 0101 0010 S 0101 0011 T 0101 0100 U 0101 0101 V 0101 0110 W 0101 0111 X 0101 1000 Y 0101 1001 Z 0101 1010 a 0110 0001 b 0110 0010 c 0110 0011 d 0110 0100 e 0110 0101 f 0110 0110 g 0110 0110 h 0110 1000 i 0110 1001 j 0110 1010
  • 17. k 0110 1011 l 0110 1100 m 0110 1101 n 0110 1110 o 0110 1111 p 0111 0000 q 0111 0001 r 0111 0010 s 0111 0011 t 0111 0100 u 0111 0101 v 0111 0110 w 0111 0111 x 0111 1000 y 0111 1001 z 0111 1010 : 0011 1010 ; 0011 1011 ? 0011 1111 . 0010 1110 , 0010 1111 ! 0010 0001 ‘ 0010 1100 “ 0010 0010 ( 0010 1000 ) 0010 1001 space 0010 0000
  • 18. ISCII ★ Stands for Indian Script Code for Information Interchange. ★ Developed to support Indian languages on computer. ★ Supported Languages: Devanagari, Tamil, Bangla, Gujarati, Gurmukhi, Tamil, Telugu, etc. ★ mostly used by government departments and before it could catch on, a new universal encoding standard called Unicode was introduced.
  • 19. UNICODE ★ Purpose: Unicode is like a universal language for computers, designed to work with all kinds of writing systems. ★ Unique Codes: Each letter, symbol, or character gets its very own number, which is different from the old ways where different systems could clash. ★ No Conflicts: Unicode's goal is to give a special number to every character, no matter what computer or program you're using, and regardless of the language. It's like a common code that everyone can understand.