SlideShare a Scribd company logo
Computer
Connections:
 Lesson 3 -
Bits & Bytes
Did you know…
• All information that travels through your
  computer is based on two commands?
On or Off
• The only data a computer can understand
  is on and off.
• But, the millions of combinations of those
  two commands given in series are what
  make a computer work.
Huh?!?

• Remember the power supply that is inside
  your computer and how it sends electricity
  to all of the components?
• That electricity is what creates an on
  signal.
bits
• The memory chips inside your computer
  are divided into thousands of tiny
  compartments called bits.

• Each bit has an electronic switch or gate.
  – On (1) = gate is open and letting electricity go
    through.
  – Off (0) = gate is closed gates because the
    electricity is blocked and cannot get through.
Binary Code
• Data is formed by grouping the bits
  together to form a series of 1/0.
• Eight bits are grouped together to form a
  byte.
• The grouping of 1/0 within a byte is called
  Binary Code.

                                     In this group of
                                     eight, there are
                                     256 possible
                                     combinations of
                                     1/0.
How Binary Code Works:
• type the letter A on your
  keyboard
• electrical signals are sent
  from the keyboard to the
  CPU.
• The CPU processes the
  signals and turns it into
  binary code.
• The computer reads the
  binary code and sends it to
  the monitor to display the
  letter A.
B, KB, MB & GB
• You may have seen these abbreviations
  many times before.

• Do you know what they mean?

           8 bits = 1 byte (B)
       1,000 B = 1 Kilobyte (KB)
       1,000 KB = 1 Megabyte (MB)
       1,000 MB = 1 Gigabyte (GB)
       1,000 GB = 1 Terabyte (TB)
Memory
• Memory/Storage capacity is measured in
  Bytes.

• Ex: 15GB hard drive = the hard drive has
  the capacity to store 15 billion bytes.
Ad

More Related Content

Similar to Comp conn 3 bits and bytes (20)

Learning Area 2
Learning Area 2Learning Area 2
Learning Area 2
norshipa
 
Learning Area 2
Learning Area 2Learning Area 2
Learning Area 2
norshipa
 
03. language of computer & translators
03. language of computer & translators03. language of computer & translators
03. language of computer & translators
TimesRide
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
Hajar Len
 
Data_Storage_Units_and_System_Components.pptx
Data_Storage_Units_and_System_Components.pptxData_Storage_Units_and_System_Components.pptx
Data_Storage_Units_and_System_Components.pptx
Ayesha Saeed
 
Bsc cs 1 fit u-1 computer hardware system
Bsc cs 1 fit u-1 computer hardware systemBsc cs 1 fit u-1 computer hardware system
Bsc cs 1 fit u-1 computer hardware system
Rai University
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
sruti009988
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
ICT8_Q4_Week_1&2.pptx
ICT8_Q4_Week_1&2.pptxICT8_Q4_Week_1&2.pptx
ICT8_Q4_Week_1&2.pptx
EdelmarBenosa3
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer Introduction
Spy Seat
 
ICT-Binary & Memory Computer Subject Topic
ICT-Binary & Memory Computer Subject TopicICT-Binary & Memory Computer Subject Topic
ICT-Binary & Memory Computer Subject Topic
JhonVergelOrpiana
 
Dhacaini
DhacainiDhacaini
Dhacaini
chrispaul8676
 
data representation
data representationdata representation
data representation
chrispaul8676
 
fundamental of computer-u-1-computer hardware system
fundamental of  computer-u-1-computer hardware systemfundamental of  computer-u-1-computer hardware system
fundamental of computer-u-1-computer hardware system
Rai University
 
Bba i-introduction to computer-u-1-computer hardware system
Bba  i-introduction to computer-u-1-computer hardware systemBba  i-introduction to computer-u-1-computer hardware system
Bba i-introduction to computer-u-1-computer hardware system
Rai University
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
Lexume1
 
EE5440 – Computer Architecture - Lecture 1
EE5440 – Computer Architecture - Lecture 1EE5440 – Computer Architecture - Lecture 1
EE5440 – Computer Architecture - Lecture 1
Dilawar Khan
 
Mca i-fundamental of computer-u-1-computer hardware system
Mca  i-fundamental of  computer-u-1-computer hardware systemMca  i-fundamental of  computer-u-1-computer hardware system
Mca i-fundamental of computer-u-1-computer hardware system
Rai University
 
Digital Electronics - Logic Gates Lectures-2.pptx
Digital Electronics - Logic Gates Lectures-2.pptxDigital Electronics - Logic Gates Lectures-2.pptx
Digital Electronics - Logic Gates Lectures-2.pptx
JonathanCasilla3
 
Learning Area 2
Learning Area 2Learning Area 2
Learning Area 2
norshipa
 
Learning Area 2
Learning Area 2Learning Area 2
Learning Area 2
norshipa
 
03. language of computer & translators
03. language of computer & translators03. language of computer & translators
03. language of computer & translators
TimesRide
 
Data_Storage_Units_and_System_Components.pptx
Data_Storage_Units_and_System_Components.pptxData_Storage_Units_and_System_Components.pptx
Data_Storage_Units_and_System_Components.pptx
Ayesha Saeed
 
Bsc cs 1 fit u-1 computer hardware system
Bsc cs 1 fit u-1 computer hardware systemBsc cs 1 fit u-1 computer hardware system
Bsc cs 1 fit u-1 computer hardware system
Rai University
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
sruti009988
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer Introduction
Spy Seat
 
ICT-Binary & Memory Computer Subject Topic
ICT-Binary & Memory Computer Subject TopicICT-Binary & Memory Computer Subject Topic
ICT-Binary & Memory Computer Subject Topic
JhonVergelOrpiana
 
fundamental of computer-u-1-computer hardware system
fundamental of  computer-u-1-computer hardware systemfundamental of  computer-u-1-computer hardware system
fundamental of computer-u-1-computer hardware system
Rai University
 
Bba i-introduction to computer-u-1-computer hardware system
Bba  i-introduction to computer-u-1-computer hardware systemBba  i-introduction to computer-u-1-computer hardware system
Bba i-introduction to computer-u-1-computer hardware system
Rai University
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
Lexume1
 
EE5440 – Computer Architecture - Lecture 1
EE5440 – Computer Architecture - Lecture 1EE5440 – Computer Architecture - Lecture 1
EE5440 – Computer Architecture - Lecture 1
Dilawar Khan
 
Mca i-fundamental of computer-u-1-computer hardware system
Mca  i-fundamental of  computer-u-1-computer hardware systemMca  i-fundamental of  computer-u-1-computer hardware system
Mca i-fundamental of computer-u-1-computer hardware system
Rai University
 
Digital Electronics - Logic Gates Lectures-2.pptx
Digital Electronics - Logic Gates Lectures-2.pptxDigital Electronics - Logic Gates Lectures-2.pptx
Digital Electronics - Logic Gates Lectures-2.pptx
JonathanCasilla3
 

More from allsaintstech (6)

Edit menu 3rd
Edit menu   3rdEdit menu   3rd
Edit menu 3rd
allsaintstech
 
File Menu - 3rd Grade
File Menu - 3rd GradeFile Menu - 3rd Grade
File Menu - 3rd Grade
allsaintstech
 
Computer Software - 7th Grade
Computer Software - 7th GradeComputer Software - 7th Grade
Computer Software - 7th Grade
allsaintstech
 
Going Online
Going OnlineGoing Online
Going Online
allsaintstech
 
Computers connections 2
Computers connections 2Computers connections 2
Computers connections 2
allsaintstech
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & folders
allsaintstech
 
File Menu - 3rd Grade
File Menu - 3rd GradeFile Menu - 3rd Grade
File Menu - 3rd Grade
allsaintstech
 
Computer Software - 7th Grade
Computer Software - 7th GradeComputer Software - 7th Grade
Computer Software - 7th Grade
allsaintstech
 
Computers connections 2
Computers connections 2Computers connections 2
Computers connections 2
allsaintstech
 
Computer lesson 7 files & folders
Computer lesson 7   files & foldersComputer lesson 7   files & folders
Computer lesson 7 files & folders
allsaintstech
 
Ad

Recently uploaded (20)

How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
UXPA Boston
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
Developing Product-Behavior Fit: UX Research in Product Development by Krysta...
UXPA Boston
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Ad

Comp conn 3 bits and bytes

  • 2. Did you know… • All information that travels through your computer is based on two commands?
  • 3. On or Off • The only data a computer can understand is on and off. • But, the millions of combinations of those two commands given in series are what make a computer work.
  • 4. Huh?!? • Remember the power supply that is inside your computer and how it sends electricity to all of the components? • That electricity is what creates an on signal.
  • 5. bits • The memory chips inside your computer are divided into thousands of tiny compartments called bits. • Each bit has an electronic switch or gate. – On (1) = gate is open and letting electricity go through. – Off (0) = gate is closed gates because the electricity is blocked and cannot get through.
  • 6. Binary Code • Data is formed by grouping the bits together to form a series of 1/0. • Eight bits are grouped together to form a byte. • The grouping of 1/0 within a byte is called Binary Code. In this group of eight, there are 256 possible combinations of 1/0.
  • 7. How Binary Code Works: • type the letter A on your keyboard • electrical signals are sent from the keyboard to the CPU. • The CPU processes the signals and turns it into binary code. • The computer reads the binary code and sends it to the monitor to display the letter A.
  • 8. B, KB, MB & GB • You may have seen these abbreviations many times before. • Do you know what they mean? 8 bits = 1 byte (B) 1,000 B = 1 Kilobyte (KB) 1,000 KB = 1 Megabyte (MB) 1,000 MB = 1 Gigabyte (GB) 1,000 GB = 1 Terabyte (TB)
  • 9. Memory • Memory/Storage capacity is measured in Bytes. • Ex: 15GB hard drive = the hard drive has the capacity to store 15 billion bytes.

Editor's Notes

  • #7: In this group of eight, there are 256 possible combinations of 1/0 .