SlideShare a Scribd company logo
1 of 17
Download to read offline
How to interpret
the contents of
stored memory
data
Memory cells store voltages - Interpreted as 0 or 1
Combinations REPRESENT numeric data ie. Letters, numbers,
punctuation marks, graphics characters
Memory is not restricted to using numeric coding
Bytes can represent:
โ— CPU Instruction codes
โ— alpha numeric characters (word processors)
โ— pure binary No's
It's all down to interpretation with the software application.
ASCII
AMERICAN STANDARD CODE FOR INFORMATION
INTERCHANGE
Original ASCII, 128 codes (0 to127) represented.
ASCII is a coding standard which means that data is stored
according to the ascii standards rules.
โ€ข English alphabet
โ€ข punctuation
โ€ข control codes
Each keyboard key has an ASCII code assigned
A.S.C.I.I. Coding
There are 255 characters available to 8 bits. 0 isn't used.
Only the numbers from 32 to 126 (20 to 7E hex) are defined as
*printable* characters (the others are defined as control codes)
0 1 2 3 4 5 6 7 8 9 A B C D E F
---------------------------------
2 | ! " # $ % & ' ( ) * + , - . /
3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4 | @ A B C D E F G H I J K L M N O
5 | P Q R S T U V W X Y Z [  ] ^ _
6 | ` a b c d e f g h i j k l m n o
7 | p q r s t u v w x y z { | } ~
ASCII has been extensively enhanced.
Modern systems use Unicode, which is a 2-
byte 16-bit system.
Further reading
ย ย 
http://en.wikipedia.org/wiki/ASCIIย  ย ย ย ย 
http://www.asciitable.com/ย 
http://www.unicode.org/
http://unicodeยญtable.com/en/
http://en.wikipedia.org/wiki/Unicode
http://www.unicode.org/standard/WhatIsUnicode.html
http://en.wikipedia.org/wiki/List_of_Unicode_characters
HOW DATA IS
MANIPULATED AND
CONTROLLED
Disk Operating Systems
DOS provides the prime means of interaction between the user
and the computer hardware.
The command interface (DOS prompt) converts keyboard
commands into instructions understood by the machine hardware.
Without DOS there is no means of interpreting input commands.
The GUI "sits" on top of DOS and provides a graphical equivalent of
keyboard commands.
Windows - written by Microsoft for PC's.
UNIX and UNIX clones, eg. Linux, Apple
http://en.wikipedia.org/wiki/Operating_system
http://upload.wikimedia.org/wikipedia/commons/7/77/Unix_history-simple.svg
HOW THE OPERATING SYSTEM IS STARTED
THE BOOT PROCESS
Turning on the POWER switch ("Cold start")
Simultaneously pressing CTRL, ALT and DELETE ("Soft start")
The boot process is controlled by the Boot ROM, located on the
motherboard, which contains part of the BIOS.
Functions of Boot ROM:
โ— Checks hardware
โ— RAM check
โ— Looks for a boot disk
The Boot Loader
โ€ข The BIOS loads into memory the program residing
in the first sector of the boot device,
called the Master Boot Record or MBR.
โ€ข The MBR is only 512 bytes in size and contains machine code
instructions for booting the machine, called a boot loader, along with
the partition table which holds the information on how the partitions,
containing file systems, are organised on the drive.
โ€ข Once the BIOS finds and loads the boot loader program into
memory, it yields control of the boot process to it, from which the
operating system can be located and run up.
http://en.wikipedia.org/wiki/Master_Boot_Record
http://en.wikipedia.org/wiki/Booting#Modern_boot_loaders
The File System
A file system controls how data is stored and retrieved.
The data is stored individually and named, called a "file".
The structure and logic of the file storage is called a "file system".
There are dozens of different systems available, and unassociated
operating systems use unrelated file systems.
For instance,
โ€ข MS Windows uses NTFS
โ€ข Linux uses ext4
Among the most important aspects of filesystems is understanding
how filenames and access permissions are treated on the two
most common OS's, ie. MS and UNIX / Linux
Comparison of filenaming conventions
UNIX Files | Windows files
-------------------------|----------------------------
256 characters filename | 256 character filename
filename.ext.ext.ext | 3 character extension
sensitive to case | not sensitive to case
Windows: k:drivespace
Unix: /home/user/webspace/images
WWW: http://news.bbc.co.uk/1/hi/sci/tech/default.stm
Note: Internet web URLs follow Unix filename conventions
Microsoft file names
Older MS-DOS formatted filenames can contain no more than 8
characters, and these must not contain any command characters.
MS Windows now allows long file names and control characters to
be used.
File extensions
โ— The file name is followed by a dot . which separates it from its
extension.
โ— The file extension is 3 characters long and describes the type of
file.
*.COM - Command file. Runs from the DOS prompt. Small file =<64 KB
*.EXE - Executable file. Larger file >= 64 KB
*.SYS - System file. Installed in memory using an installation program.
*.BAT - Batch File. Contains series of text commands batched together.
Other extensions are produced typically by application software for their data
files, eg .doc, .html, etc.
(The * is used here to represent any filename)
It is bad practice to use control characters in a file name..
When transferring files to INTERNET systems, the filenames should
be re-formatted to comply with UNIX standards.
No character is allowed which the system uses for commands or
other functions, such as , /, ., etc.
The underscore character _ is accepted as a separator as a space
must not be used.
URL encoding is needed if a filename and path contains control
characters.
Web URLs use hexadecimal encoding
โ€ข All URLs address filespace on a web server.
โ€ข All URLs obey Unix filenaming rules.
โ€ข All Windows web servers obey Unix filenaming rules.
โ€ข There are no exceptions at all.
โ€ข All URLs that use Windows filenames have to be 'repaired' using URL encoding before
they work on the web.
'What are those "%20" codes in URLs?'
http://www.blooberry.com/indexdot/html/topics/urlencoding.htm
"...Only alphanumerics [0-9a-zA-Z], the special characters "$-_.+!*'()," [not including the
quotes], and reserved characters used for their reserved purposes may be used unencoded
within a URL."
http://www.w3schools.com/tags/ref_urlencode.asp
Spaces are converted into plus (+) signs or %20 to avoid semantic ambiguities.
Special characters or 8-bit values are converted into their hexadecimal
equivalents and prefaced with a percent sign (%).
Windows drive storage
The DOS system uses drive letters, such as
a: and b: for floppy disk drives
c: for the hard disk drive
d: or e: for a CD-ROM drive
f: onwards for network drives

|_ a:____
|_ b: |_ subdirectories
|_ c: |_
|_ d: |_
|_ e:
|_ f:____
|_
|_ subdirectories

More Related Content

What's hot

Unix & Linux File System in Operating System
Unix & Linux File System in Operating SystemUnix & Linux File System in Operating System
Unix & Linux File System in Operating SystemMeghaj Mallick
ย 
File system of windows xp
File system of windows xpFile system of windows xp
File system of windows xpEhtisham Ali
ย 
File management
File managementFile management
File managementVishal Singh
ย 
File management
File managementFile management
File managementsangrampatil81
ย 
Unix File System
Unix File SystemUnix File System
Unix File Systemstudent(MCA)
ย 
Mca ii os u-5 unix linux file system
Mca  ii  os u-5 unix linux file systemMca  ii  os u-5 unix linux file system
Mca ii os u-5 unix linux file systemRai University
ย 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating SystemJanki Shah
ย 
Types of files
Types of filesTypes of files
Types of filesAmar Jukuntla
ย 
File system structure in linux
File system structure in linuxFile system structure in linux
File system structure in linuxSukkur IBA
ย 
File system
File systemFile system
File systemWajeehaBaig
ย 
File Management
File ManagementFile Management
File ManagementDiane Coyle
ย 
Working with Files
Working with FilesWorking with Files
Working with Filespremysl
ย 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File ManagementDamian T. Gordon
ย 
Important file extensions
Important file extensionsImportant file extensions
Important file extensionsSoba Arjun
ย 
Operating system file system
Operating system file systemOperating system file system
Operating system file systemAnil Pokhrel
ย 
Lab2 ppt
Lab2 pptLab2 ppt
Lab2 pptvanessajade
ย 
File management
File managementFile management
File managementSalman Khan
ย 

What's hot (20)

Unix & Linux File System in Operating System
Unix & Linux File System in Operating SystemUnix & Linux File System in Operating System
Unix & Linux File System in Operating System
ย 
File system of windows xp
File system of windows xpFile system of windows xp
File system of windows xp
ย 
linux file system
linux file systemlinux file system
linux file system
ย 
File management
File managementFile management
File management
ย 
File management
File managementFile management
File management
ย 
File management
File managementFile management
File management
ย 
Unix File System
Unix File SystemUnix File System
Unix File System
ย 
Mca ii os u-5 unix linux file system
Mca  ii  os u-5 unix linux file systemMca  ii  os u-5 unix linux file system
Mca ii os u-5 unix linux file system
ย 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
ย 
Types of files
Types of filesTypes of files
Types of files
ย 
File system structure in linux
File system structure in linuxFile system structure in linux
File system structure in linux
ย 
File system
File systemFile system
File system
ย 
File Management
File ManagementFile Management
File Management
ย 
Working with Files
Working with FilesWorking with Files
Working with Files
ย 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
ย 
Important file extensions
Important file extensionsImportant file extensions
Important file extensions
ย 
Operating system file system
Operating system file systemOperating system file system
Operating system file system
ย 
DBMS
DBMSDBMS
DBMS
ย 
Lab2 ppt
Lab2 pptLab2 ppt
Lab2 ppt
ย 
File management
File managementFile management
File management
ย 

Viewers also liked (11)

jpypqn2
jpypqn2jpypqn2
jpypqn2
ย 
The Advertising Collective - Company presentation 2016
The Advertising Collective -  Company presentation 2016The Advertising Collective -  Company presentation 2016
The Advertising Collective - Company presentation 2016
ย 
Boletรญn Agroclimรกtico Magdalena-Cesar-La Guajira #2
Boletรญn Agroclimรกtico Magdalena-Cesar-La Guajira #2Boletรญn Agroclimรกtico Magdalena-Cesar-La Guajira #2
Boletรญn Agroclimรกtico Magdalena-Cesar-La Guajira #2
ย 
Data & Identity Presentation
Data & Identity  PresentationData & Identity  Presentation
Data & Identity Presentation
ย 
Ayuda Psicologica Por Internet
Ayuda Psicologica Por InternetAyuda Psicologica Por Internet
Ayuda Psicologica Por Internet
ย 
Cรกncer de mama: prioridad apremiante para la salud en Mรฉxico
Cรกncer de mama: prioridad apremiante para la salud en MรฉxicoCรกncer de mama: prioridad apremiante para la salud en Mรฉxico
Cรกncer de mama: prioridad apremiante para la salud en Mรฉxico
ย 
Rock
RockRock
Rock
ย 
FotoprotecciรณN
FotoprotecciรณNFotoprotecciรณN
FotoprotecciรณN
ย 
EC 440: Art. 98 derecho a la resistencia
EC 440:  Art. 98 derecho a la resistenciaEC 440:  Art. 98 derecho a la resistencia
EC 440: Art. 98 derecho a la resistencia
ย 
Nuevas generaciones
Nuevas generacionesNuevas generaciones
Nuevas generaciones
ย 
Evolucioฬn de la noฬmina del sector puฬblico
Evolucioฬn de la noฬmina del sector puฬblicoEvolucioฬn de la noฬmina del sector puฬblico
Evolucioฬn de la noฬmina del sector puฬblico
ย 

Similar to How to Interpret the Contents of Stored Memory Data

Linux Command Suumary
Linux Command SuumaryLinux Command Suumary
Linux Command Suumarymentorsnet
ย 
Unix operating system
Unix operating systemUnix operating system
Unix operating systemmidhunjose4u
ย 
Linuxs1
Linuxs1Linuxs1
Linuxs1rajikaa
ย 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts MD SAQUIB KHAN
ย 
Operating System.pptx
Operating System.pptxOperating System.pptx
Operating System.pptxNoumanHameed16
ย 
Registry Forensic
Registry ForensicRegistry Forensic
Registry ForensicMD SAQUIB KHAN
ย 
Windows 2000
Windows 2000Windows 2000
Windows 2000Agnas Jasmine
ย 
Introduction to embedded linux device driver and firmware
Introduction to embedded linux device driver and firmwareIntroduction to embedded linux device driver and firmware
Introduction to embedded linux device driver and firmwaredefinecareer
ย 
CSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, PowershellCSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, PowershellRichard Homa
ย 
Nithi
NithiNithi
Nithisharmibalu
ย 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLsadil raja
ย 
Operating systems
Operating systemsOperating systems
Operating systemsChinmay Raul
ย 
Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems kuldeepy60
ย 
Chapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix ConceptsChapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix ConceptsMeenalJabde
ย 
0 introduction to computer architecture
0 introduction to computer architecture0 introduction to computer architecture
0 introduction to computer architectureaamc1100
ย 

Similar to How to Interpret the Contents of Stored Memory Data (20)

Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
ย 
Linux Command Suumary
Linux Command SuumaryLinux Command Suumary
Linux Command Suumary
ย 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
ย 
Linuxs1
Linuxs1Linuxs1
Linuxs1
ย 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
ย 
Operating System.pptx
Operating System.pptxOperating System.pptx
Operating System.pptx
ย 
Registry Forensic
Registry ForensicRegistry Forensic
Registry Forensic
ย 
Windows 2000
Windows 2000Windows 2000
Windows 2000
ย 
Introduction to embedded linux device driver and firmware
Introduction to embedded linux device driver and firmwareIntroduction to embedded linux device driver and firmware
Introduction to embedded linux device driver and firmware
ย 
CSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, PowershellCSC103 Operating Systems, System Software, Powershell
CSC103 Operating Systems, System Software, Powershell
ย 
Nithi
NithiNithi
Nithi
ย 
Windows xp
Windows xpWindows xp
Windows xp
ย 
Os concepts
Os conceptsOs concepts
Os concepts
ย 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLs
ย 
Operating systems
Operating systemsOperating systems
Operating systems
ย 
Operatingsystems
Operatingsystems Operatingsystems
Operatingsystems
ย 
Chapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix ConceptsChapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix Concepts
ย 
Ch02
Ch02Ch02
Ch02
ย 
0 introduction to computer architecture
0 introduction to computer architecture0 introduction to computer architecture
0 introduction to computer architecture
ย 
Cao 2012
Cao 2012Cao 2012
Cao 2012
ย 

More from adil raja

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdfadil raja
ย 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specificationadil raja
ย 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehiclesadil raja
ย 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystifiedadil raja
ย 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)adil raja
ย 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Researchadil raja
ย 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocoladil raja
ย 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Socketsadil raja
ย 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Executionadil raja
ย 
Thesis
ThesisThesis
Thesisadil raja
ย 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistanadil raja
ย 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousingadil raja
ย 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
ย 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
ย 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPadil raja
ย 
VoIP
VoIPVoIP
VoIPadil raja
ย 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specificationsadil raja
ย 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
ย 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUIadil raja
ย 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...adil raja
ย 

More from adil raja (20)

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
ย 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
ย 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
ย 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
ย 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
ย 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
ย 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
ย 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
ย 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
ย 
Thesis
ThesisThesis
Thesis
ย 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
ย 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
ย 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
ย 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
ย 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
ย 
VoIP
VoIPVoIP
VoIP
ย 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
ย 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
ย 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
ย 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
ย 

Recently uploaded

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
ย 
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Delhi Call girls
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...Diya Sharma
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445ruhi
ย 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 

How to Interpret the Contents of Stored Memory Data

  • 1. How to interpret the contents of stored memory data
  • 2. Memory cells store voltages - Interpreted as 0 or 1 Combinations REPRESENT numeric data ie. Letters, numbers, punctuation marks, graphics characters Memory is not restricted to using numeric coding Bytes can represent: โ— CPU Instruction codes โ— alpha numeric characters (word processors) โ— pure binary No's It's all down to interpretation with the software application.
  • 3. ASCII AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE Original ASCII, 128 codes (0 to127) represented. ASCII is a coding standard which means that data is stored according to the ascii standards rules. โ€ข English alphabet โ€ข punctuation โ€ข control codes Each keyboard key has an ASCII code assigned
  • 4. A.S.C.I.I. Coding There are 255 characters available to 8 bits. 0 isn't used. Only the numbers from 32 to 126 (20 to 7E hex) are defined as *printable* characters (the others are defined as control codes) 0 1 2 3 4 5 6 7 8 9 A B C D E F --------------------------------- 2 | ! " # $ % & ' ( ) * + , - . / 3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ? 4 | @ A B C D E F G H I J K L M N O 5 | P Q R S T U V W X Y Z [ ] ^ _ 6 | ` a b c d e f g h i j k l m n o 7 | p q r s t u v w x y z { | } ~
  • 5. ASCII has been extensively enhanced. Modern systems use Unicode, which is a 2- byte 16-bit system.
  • 7. HOW DATA IS MANIPULATED AND CONTROLLED Disk Operating Systems
  • 8. DOS provides the prime means of interaction between the user and the computer hardware. The command interface (DOS prompt) converts keyboard commands into instructions understood by the machine hardware. Without DOS there is no means of interpreting input commands. The GUI "sits" on top of DOS and provides a graphical equivalent of keyboard commands. Windows - written by Microsoft for PC's. UNIX and UNIX clones, eg. Linux, Apple http://en.wikipedia.org/wiki/Operating_system http://upload.wikimedia.org/wikipedia/commons/7/77/Unix_history-simple.svg
  • 9. HOW THE OPERATING SYSTEM IS STARTED THE BOOT PROCESS Turning on the POWER switch ("Cold start") Simultaneously pressing CTRL, ALT and DELETE ("Soft start") The boot process is controlled by the Boot ROM, located on the motherboard, which contains part of the BIOS. Functions of Boot ROM: โ— Checks hardware โ— RAM check โ— Looks for a boot disk
  • 10. The Boot Loader โ€ข The BIOS loads into memory the program residing in the first sector of the boot device, called the Master Boot Record or MBR. โ€ข The MBR is only 512 bytes in size and contains machine code instructions for booting the machine, called a boot loader, along with the partition table which holds the information on how the partitions, containing file systems, are organised on the drive. โ€ข Once the BIOS finds and loads the boot loader program into memory, it yields control of the boot process to it, from which the operating system can be located and run up. http://en.wikipedia.org/wiki/Master_Boot_Record http://en.wikipedia.org/wiki/Booting#Modern_boot_loaders
  • 11. The File System A file system controls how data is stored and retrieved. The data is stored individually and named, called a "file". The structure and logic of the file storage is called a "file system". There are dozens of different systems available, and unassociated operating systems use unrelated file systems. For instance, โ€ข MS Windows uses NTFS โ€ข Linux uses ext4 Among the most important aspects of filesystems is understanding how filenames and access permissions are treated on the two most common OS's, ie. MS and UNIX / Linux
  • 12. Comparison of filenaming conventions UNIX Files | Windows files -------------------------|---------------------------- 256 characters filename | 256 character filename filename.ext.ext.ext | 3 character extension sensitive to case | not sensitive to case Windows: k:drivespace Unix: /home/user/webspace/images WWW: http://news.bbc.co.uk/1/hi/sci/tech/default.stm Note: Internet web URLs follow Unix filename conventions
  • 13. Microsoft file names Older MS-DOS formatted filenames can contain no more than 8 characters, and these must not contain any command characters. MS Windows now allows long file names and control characters to be used.
  • 14. File extensions โ— The file name is followed by a dot . which separates it from its extension. โ— The file extension is 3 characters long and describes the type of file. *.COM - Command file. Runs from the DOS prompt. Small file =<64 KB *.EXE - Executable file. Larger file >= 64 KB *.SYS - System file. Installed in memory using an installation program. *.BAT - Batch File. Contains series of text commands batched together. Other extensions are produced typically by application software for their data files, eg .doc, .html, etc. (The * is used here to represent any filename)
  • 15. It is bad practice to use control characters in a file name.. When transferring files to INTERNET systems, the filenames should be re-formatted to comply with UNIX standards. No character is allowed which the system uses for commands or other functions, such as , /, ., etc. The underscore character _ is accepted as a separator as a space must not be used. URL encoding is needed if a filename and path contains control characters.
  • 16. Web URLs use hexadecimal encoding โ€ข All URLs address filespace on a web server. โ€ข All URLs obey Unix filenaming rules. โ€ข All Windows web servers obey Unix filenaming rules. โ€ข There are no exceptions at all. โ€ข All URLs that use Windows filenames have to be 'repaired' using URL encoding before they work on the web. 'What are those "%20" codes in URLs?' http://www.blooberry.com/indexdot/html/topics/urlencoding.htm "...Only alphanumerics [0-9a-zA-Z], the special characters "$-_.+!*'()," [not including the quotes], and reserved characters used for their reserved purposes may be used unencoded within a URL." http://www.w3schools.com/tags/ref_urlencode.asp Spaces are converted into plus (+) signs or %20 to avoid semantic ambiguities. Special characters or 8-bit values are converted into their hexadecimal equivalents and prefaced with a percent sign (%).
  • 17. Windows drive storage The DOS system uses drive letters, such as a: and b: for floppy disk drives c: for the hard disk drive d: or e: for a CD-ROM drive f: onwards for network drives |_ a:____ |_ b: |_ subdirectories |_ c: |_ |_ d: |_ |_ e: |_ f:____ |_ |_ subdirectories