Toshibasupport

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 16 September 2010

What Is Data Processing, What Is Data Representation?

Posted on 17:25 by Unknown
When people communicate by writing in any language, the symbols used (the letters of the alphabet, numerals, and punctuation marks) convey information. The symbols themselves are not information, but representations of information. Data in an EDPS must be expressed symbolically so that the machines can interpret the information presented by humans. In general, the symbols that are read and interpreted by a machine differ from those used by people. The designer of a computer system determines the nature and meaning of a particular set of symbols that can be read and interpreted by the system. The actual data that is used by these systems is (or was in the past) presented as holes on punched cards or paper tape, as spots on magnetic tape, as bits (binary digit) or bytes of information in a disk, diskette, CD-ROM, or optical disk; as magnetic-ink characters; as pixels in display-screen images; as points in plotted graphs; or as communication-network signals.
In many instances, communication occurs between machines. This communication can be a direct exchange of data in electronic form over cables, wires, radio waves, infrared, satellites or even wireless devices such as cellular phones, pagers, and hand-held personal organizers and/or notebooks. It can also be an exchange where the recorded or stored output of one device or system becomes the input of another machine or system.
In the computer, data is recorded electronically. The presence or absence of a signal in specific circuitry represents data in the computer the same way that the absence or presence of a punched hole represented data in a punched card. If we think of an ordinary lightbulb being either on or off, we could define its operation as a binary mode. That means that at any given time the lightbulb can be in only one of two possible conditions. This is known as a "binary state." In a computer, transistors are conducting or nonconducting; magnetic materials are magnetized in one direction or in the opposite direction; a switch or relay is either on or off, a specific voltage is either present or absent. These are all binary states. Representing data within the computer is accomplished by assigning a specific value to each binary indication or group of binary indications. Binary signals can be used to represent both instructions and data; consequently the basic language of the computer is based primarily on the "binary number system."
A binary method of notation is usually used to illustrate binary indications. This method uses only two symbols: 0 and 1, where 0 and 1 represent the absence and presence of an assigned value, respectively. These symbols, or binary digits, are called "bits." A group of eight bits is known as a "byte," and a group of 32 bits (4 bytes) is known as a "word." The bit positions within a byte or a word have place values related to the binary number system. In the binary number system the values of these symbols are determined by their positions in a multidigit numeral. The position values are based on the right to left progression of powers having a base of 2 (20, 21, 22, 23), commonly employed within digital computers. For example, if there are four light bulbs next to each other numbered 4, 3, 2, and 1 and 1 and 3 are "on" and 2 and 4 are "off," the binary notation is 0101.

The system of expressing decimal digits as an equivalent binary value is known as Binary Coded Decimal (BCD). In this code, all characters (64 characters can be coded), including alphabetic, numeric, and special signs, are represented using six positions of binary notation (plus a parity bit position). The Extended Binary Coded Decimal Interchange Code (EBCDIC) uses eight binary positions for each character format plus a position for parity checking (256 characters can be coded). The American Standard Code for Information Interchange (ASCII) is a seven-bit code that offers 128 possible characters. ASCII was developed by users of communications and data processing equipment as an attempt to standardize machine-to-machine and system-to-system communication.
Computer Number Systems and Conversions. Representing a decimal number in binary numbers may require very long strings of ones and zeros. The hexadecimal system is used as a shorthand method to represent them. The base of this system is 16, and the symbols used are: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F. In other words, F is 15 in decimal notation and 1 1 1 1 in binary.
Programming Languages Techniques. Assembler languages are closer to machine instructions than to human language, and having to express logical procedures, arithmetical calculations, and textual manipulations in these languages affects a programmer's productivity because they are so cumbersome. There are many higher-level programming languages, such as ALGOL, BASIC, COBOL, FORTRAN, and Pascal, that are much closer to human means of expression.
A programmer writes a source program in a human-readable programming language. A compiler translates these English-like statements into instructions that the computer can execute—such instructions are called an "object program." Through added library routines the computer does further processing of the object program, executes it, and an "output" is produced. There are some "optimizing compilers" that automatically correct obvious inefficiencies in source programming. Sometimes, with the use of "interpreters," debugging can be done to a program as it executes the user program piece by piece. MUMPS, LISP, and APL are interpreters used for this purpose in the health care environment, artificial intelligence, and mathematics fields, respectively. Because of the time and costs associated with development, it is generally not cost effective in today's environment to develop an application package, but rather buy it (if available) from a vendor. The costs are thus spread among thousands of users. Typical applications packages used for public health purposes are SAS and SPSS (for biostatistics) and ArcView/GIS (for Geographical Information Systems). In addition there are some data manipulation languages (e.g., Oracle and dBASE) that were written with this purpose. A database manipulation language (DML) is a special sublanguage used for handling data storage and retrieval in a database system. Using a data definition language (DDL), programmers can organize and structure data on secondary storage devices.
Data Acquisition. Capturing and entering data into a computer is expensive. Direct acquisition of data avoids the need for people to read values and measure, encode, and/or enter the data. Automated data acquisition can help eliminate errors and speed up the procedure. Sensors connected to a patient convert biological signals into electrical signals that are transmitted into a computer. Many times these signals (e.g., ECG, blood pressure, heart rate) are analog signals, and in order to be stored into a digital signal a conversion needs to occur. This process is called analog to digital conversion (ADC).
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Information Technology | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finest Way to Repair Windows Registry
    Comprehensive Manual on How to Repair Windows Registry One of the worst things that can happen to you when you are trying to use a computer ...
  • Make Faster And Faster Your PC Windows
    Fed up with your time-consuming PC-startup times? Well, previously in  my blog  i have review about  startup blaster , a software which can ...
  • How To Select A Good Domain Name
    If you already have a busy website and you like your domain there's no need to change it but as soon as you set up a new website or if y...
  • Samsung RF510-S01 Review
    Samsung RF510-S01 , They've energy and performance? Your laptop is here. Availability Samsung RF510. This is a 15.6-inch HD (1366 x 768)...
  • What Is PayPal?
    PayPal  www.paypal.com PayPal, a subsidiary of eBay, is the most popular online payment service - operating in over 190 markets. Unfortunate...
  • Top 8 Tips To Increase YOur Web Traffic From Yahoo
    Here I am writing 8 short, easiest and interesting tips for increasing your web traffic at once 1) Selecting your domain name is the most vi...
  • Hp 4520s Review
    The HP ProBook 4520s is in actuality only a little and method institution laptop computer that replaces the more mature 4510s from last year...
  • Get 100% Free keywords Suggestion Tools
    Keywords are simply the words that people use when they search the Web and keyword research and selection is essential in any online marketi...
  • Toshiba Support
    It was heavily raining that morning when I gave birth to my little baby girl who is 2 years now. I still remember that morning fondly, first...
  • Using BuddyPress plugins How To Forum Attach?
    A few people have asked recently for a list of the plugins installed on the  CUNY Academic Commons . In the spirit of  Joe’s post , here I t...

Categories

  • About Computer
  • About Internet
  • Antivirus
  • AVG Internet Security
  • Data Protection
  • E-mail service
  • Firewall protection guides
  • Forum Attachment
  • Free Web Hosting
  • Get Free Software
  • Health and Safety Issues in Use of Digital Media
  • Hy Phy
  • Identity Protection
  • Information Technology
  • Internet Elements
  • Internet Safety Guides
  • Internet Tips And Tricks
  • Keyloggers
  • Make Money From Website
  • Messenger
  • Mobile
  • Mommy Blogs.
  • News
  • Online Children Protection
  • Password Security Guide
  • PC Hacking
  • Promote your web/blog
  • Protect Your PC
  • Search Engine
  • Server Security
  • Software
  • Technical Information
  • Tips For More Traffic
  • USB Protection
  • Windows Protection

Blog Archive

  • ►  2012 (2)
    • ►  September (2)
  • ▼  2010 (410)
    • ►  December (10)
    • ►  October (23)
    • ▼  September (377)
      • 6 Dollar Paypal Money Method, As seen on Oprah and...
      • Your Business Website
      • How To Select A Good Domain Name
      • Bloger For Students Earning
      • Get Tips For Search Engine Optimization Guideline
      • 100 Tips To Get Traffic For Free
      • Get 6 Tips To Increase Your Web Traffic
      • Generate Free Internet Traffic On Your Blog
      • Get 3 Important Ways For More Traffic
      • Top 10 Ways To Get More Traffic
      • Top 25 Tips To Speed Up Your Windows XP
      • 10 Tips Online Security
      • Top 12 Tips To Make Your PC Virus Free
      • Make A Password Protected Folder
      • Anti Virus Security Guidelines
      • 9 Steps TO Run FIreFox Correctly
      • Top 7 Tips To Start Internet Explorer Correctly
      • Top 6 Tips For Firewall Security
      • Top 7 For Internet Explorer Security
      • Browser troublemaking Security Guidelines
      • Why Web Link Is Not Working Inside The E-mail?
      • My file is too large to be sent over email.
      • You receive an error when opening messages or send...
      • An attachment you received has been blocked.
      • What is server error on sending e-mail
      • E-mail Security Guidelines
      • Internet Connection Security Guides
      • Two Firewalls Can Work At Once
      • Here is some firewall installation tips that makes...
      • How To Turn On You Firewall
      • Firewall Security guideline
      • How RAM work well?
      • RAM Protection Guideline
      • New Types of RAMs
      • RAM Is Not Working
      • Protection Of RAM
      • Why PC Show Errors On Heavy Workload?
      • 6 Steps To Protect You PC From Virus
      • Protect your PC With Spyware
      • 4 Tips To Protect Your PC
      • 4 Steps To Increase Your Online Security
      • 3 Important Hotmail Security Features
      • 4 Ways That How Spammer Find Your E-mail Address
      • 6 Steps To Save Your E-mail Address From Spammers
      • Important Guideline For Firewall Optimization
      • Top 10 Tips To Protect Your Online Network
      • Three Steps To Speed Up Your Computer
      • Top 10 Tips To Protect Your PC Online
      • Internet Security Guidelines
      • Get Suggestion For Writing An Article
      • Get 100% Free Tips To Publish Tour Article
      • Secret Of Writing An Article For You Blog/Web
      • Get Some Important Tips About WordPress Blogroll G...
      • Get 26 Tips For More Traffic
      • Tips To Increase Your Web/blog Traffic
      • Top 8 Tips To Increase YOur Web Traffic From Yahoo
      • Learn how to setting up on a chair correctly
      • What should be light conditions while using computer
      • How To Watch At Your PC Monitor
      • How to protect your Health while using computer
      • In Which Position We Should Use Computer
      • Some Important Precusiones While Working On Computer
      • Install Windows Gadgets
      • Important Keyfinder For Windows Product Keys
      • A Useful Tip To Upgrade windows 98
      • Get Top 11 Windows 98 Product Key Code 100% Free
      • Descriptions Of Magical Jelly Bean Keyfinder v2.0.8
      • Get Tips To Find The Windows Administration Password
      • Change your windows password
      • Get Top 6 Free Windows Password Recovery Tools 100...
      • Get Top 11 c r a c k i n g t o o l s 100% free
      • Get Top 10 Password Crackers
      • Put Your Desired Size To Recycle bin
      • Get Tips For How To Quick Format Vs Default Format?
      • Turn On Your Num Lock Forever
      • Learn How To Hid An Icon
      • Run The Systeminfo Utility In Windows XP
      • Control All The Open Windows By Keyboard Shortcut ...
      • Save The energy Of Your Computer
      • Select Different Sounds For Different Windows Events
      • Change Icon Spacing In Windows XP
      • Start windows programs quickly with Run Command
      • A Trick To Change The Name Of Recycle Bin
      • Put Away Undesired Users From Shown Down Key
      • Put An Image On The Folder
      • Get Windows Vista Shortcut keys For 100% Free
      • Get Your Lost Files In Computer Without Using Any ...
      • Put Shortcut Keys To Your Internet Connection
      • How to Print a document faster and faster
      • If You Are Ready for SP2 Than Your PC Will Be Safe
      • Add www And .com Automatically To Your Address Bro...
      • What Are The Requirements To Install Windows Vista
      • Word Processing Software
      • What is APPLICATION SOFTWARE?
      • Picture Yourself Using Software
      • Taking a look at chutti.pk, Pakistan's first onlin...
      • What is Plimus and 2Checkout?
      • What Is AlertPay?
      • What Is Moneybookers?
      • What Is Payoneer?
Powered by Blogger.

About Me

Unknown
View my complete profile