SlideShare a Scribd company logo
1 of 12
Hexadecimal A451 – Representation of data in Computing systems
Get your brains logged on ,[object Object],[object Object]
By the end of this session: ,[object Object],[object Object],[object Object]
Hexadecimal 0 8 1 9 2 A 3 B 4 C 5 D 6 E 7 F
Binary-Hex Conversion ,[object Object],1000  1101 1 st  nibble 2 nd  nibble
Binary-Hex Conversion ,[object Object],[object Object]
Your Turn: Binary-Hex conversions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your Turn: Denary-Hex conversions ,[object Object],[object Object],[object Object]
Hex-Binary Conversion ,[object Object],[object Object],Hex 8 D Denary 8 4 2 1 8 4 2 1 Binary 1 0 0 0 1 1 0 1
Hex-Binary Conversion
Your Turn: Hex-Binary conversions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your Turn: Hex-Denary conversions ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Representing sound
Representing soundRepresenting sound
Representing sound
wardjo
 
Representing text
Representing textRepresenting text
Representing text
wardjo
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
wardjo
 
Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
wardjo
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
wardjo
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
wardjo
 
Storage
StorageStorage
Storage
wardjo
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
wardjo
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 

Viewers also liked (9)

Representing sound
Representing soundRepresenting sound
Representing sound
 
Representing text
Representing textRepresenting text
Representing text
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
 
Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
 
Storage
StorageStorage
Storage
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 

Similar to Hexadecimal

Bin to hexa.22to23
Bin to hexa.22to23Bin to hexa.22to23
Bin to hexa.22to23
myrajendra
 
Binary octal
Binary octalBinary octal
Binary octal
drdipo4
 
Representation Of Data
Representation Of DataRepresentation Of Data
Representation Of Data
gavhays
 

Similar to Hexadecimal (20)

Number system
Number systemNumber system
Number system
 
Number system by ammar nawab
Number system by ammar nawabNumber system by ammar nawab
Number system by ammar nawab
 
Bin to hexa.22to23
Bin to hexa.22to23Bin to hexa.22to23
Bin to hexa.22to23
 
Unit 4.docx
Unit 4.docxUnit 4.docx
Unit 4.docx
 
Number system
Number systemNumber system
Number system
 
Binary octal
Binary octalBinary octal
Binary octal
 
Number Systems
Number SystemsNumber Systems
Number Systems
 
Data representation number
Data representation   numberData representation   number
Data representation number
 
Representation Of Data
Representation Of DataRepresentation Of Data
Representation Of Data
 
Digital basics
Digital basicsDigital basics
Digital basics
 
As Level Computer Science Book -1
As Level Computer Science  Book -1As Level Computer Science  Book -1
As Level Computer Science Book -1
 
U1 - Code Conversion.pptx
U1 - Code Conversion.pptxU1 - Code Conversion.pptx
U1 - Code Conversion.pptx
 
Number System
Number SystemNumber System
Number System
 
Number bases
Number basesNumber bases
Number bases
 
Number system in Digital Electronics
Number system in Digital ElectronicsNumber system in Digital Electronics
Number system in Digital Electronics
 
uyuyuy.pdf
uyuyuy.pdfuyuyuy.pdf
uyuyuy.pdf
 
Number System and Conversions.pptx
Number System and Conversions.pptxNumber System and Conversions.pptx
Number System and Conversions.pptx
 
005618132.pdf
005618132.pdf005618132.pdf
005618132.pdf
 
Data Representation
Data RepresentationData Representation
Data Representation
 
01 intro
01 intro01 intro
01 intro
 

More from wardjo

Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
wardjo
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
wardjo
 
Software
SoftwareSoftware
Software
wardjo
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
wardjo
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
wardjo
 
Binary logic
Binary logicBinary logic
Binary logic
wardjo
 

More from wardjo (6)

Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Software
SoftwareSoftware
Software
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
 
Binary logic
Binary logicBinary logic
Binary logic
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Hexadecimal