SlideShare a Scribd company logo
How to interpret
the contents of
stored memory
data
Memory cells store voltages - Interpreted as 0 or 1
Combinations REPRESENT numeric data ie. Letters, numbers,
punctuation marks, graphics characters
Memory is not restricted to using numeric coding
Bytes can represent:
● CPU Instruction codes
● alpha numeric characters (word processors)
● pure binary No's
It's all down to interpretation with the software application.
ASCII
AMERICAN STANDARD CODE FOR INFORMATION
INTERCHANGE
Original ASCII, 128 codes (0 to127) represented.
ASCII is a coding standard which means that data is stored
according to the ascii standards rules.
• English alphabet
• punctuation
• control codes
Each keyboard key has an ASCII code assigned
A.S.C.I.I. Coding
There are 255 characters available to 8 bits. 0 isn't used.
Only the numbers from 32 to 126 (20 to 7E hex) are defined as
*printable* characters (the others are defined as control codes)
0 1 2 3 4 5 6 7 8 9 A B C D E F
---------------------------------
2 | ! " # $ % & ' ( ) * + , - . /
3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4 | @ A B C D E F G H I J K L M N O
5 | P Q R S T U V W X Y Z [  ] ^ _
6 | ` a b c d e f g h i j k l m n o
7 | p q r s t u v w x y z { | } ~
ASCII has been extensively enhanced.
Modern systems use Unicode, which is a 2-
byte 16-bit system.
Further reading
  
http://en.wikipedia.org/wiki/ASCII      
http://www.asciitable.com/ 
http://www.unicode.org/
http://unicode­table.com/en/
http://en.wikipedia.org/wiki/Unicode
http://www.unicode.org/standard/WhatIsUnicode.html
http://en.wikipedia.org/wiki/List_of_Unicode_characters
HOW DATA IS
MANIPULATED AND
CONTROLLED
Disk Operating Systems
DOS provides the prime means of interaction between the user
and the computer hardware.
The command interface (DOS prompt) converts keyboard
commands into instructions understood by the machine hardware.
Without DOS there is no means of interpreting input commands.
The GUI "sits" on top of DOS and provides a graphical equivalent of
keyboard commands.
Windows - written by Microsoft for PC's.
UNIX and UNIX clones, eg. Linux, Apple
http://en.wikipedia.org/wiki/Operating_system
http://upload.wikimedia.org/wikipedia/commons/7/77/Unix_history-simple.svg
HOW THE OPERATING SYSTEM IS STARTED
THE BOOT PROCESS
Turning on the POWER switch ("Cold start")
Simultaneously pressing CTRL, ALT and DELETE ("Soft start")
The boot process is controlled by the Boot ROM, located on the
motherboard, which contains part of the BIOS.
Functions of Boot ROM:
● Checks hardware
● RAM check
● Looks for a boot disk
The Boot Loader
• The BIOS loads into memory the program residing
in the first sector of the boot device,
called the Master Boot Record or MBR.
• The MBR is only 512 bytes in size and contains machine code
instructions for booting the machine, called a boot loader, along with
the partition table which holds the information on how the partitions,
containing file systems, are organised on the drive.
• Once the BIOS finds and loads the boot loader program into
memory, it yields control of the boot process to it, from which the
operating system can be located and run up.
http://en.wikipedia.org/wiki/Master_Boot_Record
http://en.wikipedia.org/wiki/Booting#Modern_boot_loaders
The File System
A file system controls how data is stored and retrieved.
The data is stored individually and named, called a "file".
The structure and logic of the file storage is called a "file system".
There are dozens of different systems available, and unassociated
operating systems use unrelated file systems.
For instance,
• MS Windows uses NTFS
• Linux uses ext4
Among the most important aspects of filesystems is understanding
how filenames and access permissions are treated on the two
most common OS's, ie. MS and UNIX / Linux
Comparison of filenaming conventions
UNIX Files | Windows files
-------------------------|----------------------------
256 characters filename | 256 character filename
filename.ext.ext.ext | 3 character extension
sensitive to case | not sensitive to case
Windows: k:drivespace
Unix: /home/user/webspace/images
WWW: http://news.bbc.co.uk/1/hi/sci/tech/default.stm
Note: Internet web URLs follow Unix filename conventions
Microsoft file names
Older MS-DOS formatted filenames can contain no more than 8
characters, and these must not contain any command characters.
MS Windows now allows long file names and control characters to
be used.
File extensions
● The file name is followed by a dot . which separates it from its
extension.
● The file extension is 3 characters long and describes the type of
file.
*.COM - Command file. Runs from the DOS prompt. Small file =<64 KB
*.EXE - Executable file. Larger file >= 64 KB
*.SYS - System file. Installed in memory using an installation program.
*.BAT - Batch File. Contains series of text commands batched together.
Other extensions are produced typically by application software for their data
files, eg .doc, .html, etc.
(The * is used here to represent any filename)
It is bad practice to use control characters in a file name..
When transferring files to INTERNET systems, the filenames should
be re-formatted to comply with UNIX standards.
No character is allowed which the system uses for commands or
other functions, such as , /, ., etc.
The underscore character _ is accepted as a separator as a space
must not be used.
URL encoding is needed if a filename and path contains control
characters.
Web URLs use hexadecimal encoding
• All URLs address filespace on a web server.
• All URLs obey Unix filenaming rules.
• All Windows web servers obey Unix filenaming rules.
• There are no exceptions at all.
• All URLs that use Windows filenames have to be 'repaired' using URL encoding before
they work on the web.
'What are those "%20" codes in URLs?'
http://www.blooberry.com/indexdot/html/topics/urlencoding.htm
"...Only alphanumerics [0-9a-zA-Z], the special characters "$-_.+!*'()," [not including the
quotes], and reserved characters used for their reserved purposes may be used unencoded
within a URL."
http://www.w3schools.com/tags/ref_urlencode.asp
Spaces are converted into plus (+) signs or %20 to avoid semantic ambiguities.
Special characters or 8-bit values are converted into their hexadecimal
equivalents and prefaced with a percent sign (%).
Windows drive storage
The DOS system uses drive letters, such as
a: and b: for floppy disk drives
c: for the hard disk drive
d: or e: for a CD-ROM drive
f: onwards for network drives

|_ a:____
|_ b: |_ subdirectories
|_ c: |_
|_ d: |_
|_ e:
|_ f:____
|_
|_ subdirectories

More Related Content

PDF
Memory
adil raja
 
PPT
Computer
Shivangi Shah
 
PPTX
Unix training session 1
Anil Kumar Kapil,PMP®
 
PPTX
File system of windows xp
ashubhardwaj03
 
PPTX
File and fat
Vimal Madhale
 
PPTX
File and fat 2
Vimal Madhale
 
PPT
File system
Harleen Johal
 
DOCX
The linux file system structure
Teja Bheemanapally
 
Memory
adil raja
 
Computer
Shivangi Shah
 
Unix training session 1
Anil Kumar Kapil,PMP®
 
File system of windows xp
ashubhardwaj03
 
File and fat
Vimal Madhale
 
File and fat 2
Vimal Madhale
 
File system
Harleen Johal
 
The linux file system structure
Teja Bheemanapally
 

What's hot (20)

PPTX
Unix & Linux File System in Operating System
Meghaj Mallick
 
PPTX
File system of windows xp
Ehtisham Ali
 
PDF
linux file system
AryaTadbir Network Designers
 
PPTX
File management
Vishal Singh
 
PPTX
File management
sangrampatil81
 
PPT
Unix File System
student(MCA)
 
PPT
Mca ii os u-5 unix linux file system
Rai University
 
PPTX
File Management in Operating System
Janki Shah
 
PPTX
Types of files
Amar Jukuntla
 
PPTX
File system structure in linux
Sukkur IBA
 
PDF
File system
WajeehaBaig
 
PPT
File Management
Diane Coyle
 
PPTX
Working with Files
premysl
 
PPTX
Operating Systems - File Management
Damian T. Gordon
 
PDF
Important file extensions
Soba Arjun
 
PPTX
Operating system file system
Anil Pokhrel
 
PPT
DBMS
Mannat Gill
 
PPTX
Lab2 ppt
vanessajade
 
PPT
File management
Salman Khan
 
PPTX
Ext filesystem4
Neha Kulkarni
 
Unix & Linux File System in Operating System
Meghaj Mallick
 
File system of windows xp
Ehtisham Ali
 
linux file system
AryaTadbir Network Designers
 
File management
Vishal Singh
 
File management
sangrampatil81
 
Unix File System
student(MCA)
 
Mca ii os u-5 unix linux file system
Rai University
 
File Management in Operating System
Janki Shah
 
Types of files
Amar Jukuntla
 
File system structure in linux
Sukkur IBA
 
File system
WajeehaBaig
 
File Management
Diane Coyle
 
Working with Files
premysl
 
Operating Systems - File Management
Damian T. Gordon
 
Important file extensions
Soba Arjun
 
Operating system file system
Anil Pokhrel
 
Lab2 ppt
vanessajade
 
File management
Salman Khan
 
Ext filesystem4
Neha Kulkarni
 
Ad

Viewers also liked (11)

PDF
The Advertising Collective - Company presentation 2016
Jan Stoop
 
PDF
Boletín Agroclimático Magdalena-Cesar-La Guajira #2
CCAFS | CGIAR Research Program on Climate Change, Agriculture and Food Security
 
PPTX
Data & Identity Presentation
SwitchPitch
 
PDF
Ayuda Psicologica Por Internet
Richard Huett
 
PDF
Cáncer de mama: prioridad apremiante para la salud en México
Fundación Mexicana para la Salud A.C.
 
PPT
Rock
sergiocobo92
 
PPT
FotoproteccióN
Antero Vasquez Mejia
 
PPTX
EC 440: Art. 98 derecho a la resistencia
Presidencia de la República del Ecuador
 
PPTX
Nuevas generaciones
SandraArreola
 
PPTX
Evolución de la nómina del sector público
Presidencia de la República del Ecuador
 
The Advertising Collective - Company presentation 2016
Jan Stoop
 
Boletín Agroclimático Magdalena-Cesar-La Guajira #2
CCAFS | CGIAR Research Program on Climate Change, Agriculture and Food Security
 
Data & Identity Presentation
SwitchPitch
 
Ayuda Psicologica Por Internet
Richard Huett
 
Cáncer de mama: prioridad apremiante para la salud en México
Fundación Mexicana para la Salud A.C.
 
FotoproteccióN
Antero Vasquez Mejia
 
EC 440: Art. 98 derecho a la resistencia
Presidencia de la República del Ecuador
 
Nuevas generaciones
SandraArreola
 
Evolución de la nómina del sector público
Presidencia de la República del Ecuador
 
Ad

Similar to How to Interpret the Contents of Stored Memory Data (20)

PPT
Spsl unit1
Sasidhar Kothuru
 
PPTX
Linux Command Suumary
mentorsnet
 
DOCX
Unix operating system
midhunjose4u
 
ODP
Linuxs1
rajikaa
 
PPTX
Windows Registry Forensics - Artifacts
MD SAQUIB KHAN
 
PPTX
Operating System.pptx
NoumanHameed16
 
PPTX
Lecture for computer organization COAL Lec-1.pptx
khanzasad009
 
PPTX
Registry Forensic
MD SAQUIB KHAN
 
PPT
Windows 2000
Agnas Jasmine
 
PPSX
Introduction to embedded linux device driver and firmware
definecareer
 
PPTX
3_Arch_and_Kernels_for_computer_systems.pptx
verdemarco991
 
PPTX
CSC103 Operating Systems, System Software, Powershell
Richard Homa
 
ODP
Nithi
sharmibalu
 
PPT
Windows xp
Dr. C.V. Suresh Babu
 
PPT
Os concepts
John Carlo Catacutan
 
PDF
From Drives to URLs
adil raja
 
PPT
Operating systems
Chinmay Raul
 
PPS
Operatingsystems
kuldeepy60
 
PPTX
Chapter 2 Introduction to Unix Concepts
MeenalJabde
 
PDF
Linux For Beginners! Ultimate guide to Linux Users!!
mailtosidharthme
 
Spsl unit1
Sasidhar Kothuru
 
Linux Command Suumary
mentorsnet
 
Unix operating system
midhunjose4u
 
Linuxs1
rajikaa
 
Windows Registry Forensics - Artifacts
MD SAQUIB KHAN
 
Operating System.pptx
NoumanHameed16
 
Lecture for computer organization COAL Lec-1.pptx
khanzasad009
 
Registry Forensic
MD SAQUIB KHAN
 
Windows 2000
Agnas Jasmine
 
Introduction to embedded linux device driver and firmware
definecareer
 
3_Arch_and_Kernels_for_computer_systems.pptx
verdemarco991
 
CSC103 Operating Systems, System Software, Powershell
Richard Homa
 
Nithi
sharmibalu
 
From Drives to URLs
adil raja
 
Operating systems
Chinmay Raul
 
Operatingsystems
kuldeepy60
 
Chapter 2 Introduction to Unix Concepts
MeenalJabde
 
Linux For Beginners! Ultimate guide to Linux Users!!
mailtosidharthme
 

More from adil raja (20)

PDF
ANNs.pdf
adil raja
 
PDF
A Software Requirements Specification
adil raja
 
PDF
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
PDF
DevOps Demystified
adil raja
 
PDF
On Research (And Development)
adil raja
 
PDF
Simulators as Drivers of Cutting Edge Research
adil raja
 
PDF
The Knock Knock Protocol
adil raja
 
PDF
File Transfer Through Sockets
adil raja
 
PDF
Remote Command Execution
adil raja
 
PDF
Thesis
adil raja
 
PDF
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
PDF
Data Warehousing
adil raja
 
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
PDF
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
PDF
VoIP
adil raja
 
PDF
ULMAN GUI Specifications
adil raja
 
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
PDF
ULMAN-GUI
adil raja
 
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ANNs.pdf
adil raja
 
A Software Requirements Specification
adil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
DevOps Demystified
adil raja
 
On Research (And Development)
adil raja
 
Simulators as Drivers of Cutting Edge Research
adil raja
 
The Knock Knock Protocol
adil raja
 
File Transfer Through Sockets
adil raja
 
Remote Command Execution
adil raja
 
Thesis
adil raja
 
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
Data Warehousing
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
VoIP
adil raja
 
ULMAN GUI Specifications
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ULMAN-GUI
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 

Recently uploaded (20)

PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
How tech helps people in the modern era.
upadhyayaryan154
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
Crypto Recovery California Services.pptx
lionsgate network
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
Different Generation Of Computers .pptx
divcoder9507
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 

How to Interpret the Contents of Stored Memory Data

  • 1. How to interpret the contents of stored memory data
  • 2. Memory cells store voltages - Interpreted as 0 or 1 Combinations REPRESENT numeric data ie. Letters, numbers, punctuation marks, graphics characters Memory is not restricted to using numeric coding Bytes can represent: ● CPU Instruction codes ● alpha numeric characters (word processors) ● pure binary No's It's all down to interpretation with the software application.
  • 3. ASCII AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE Original ASCII, 128 codes (0 to127) represented. ASCII is a coding standard which means that data is stored according to the ascii standards rules. • English alphabet • punctuation • control codes Each keyboard key has an ASCII code assigned
  • 4. A.S.C.I.I. Coding There are 255 characters available to 8 bits. 0 isn't used. Only the numbers from 32 to 126 (20 to 7E hex) are defined as *printable* characters (the others are defined as control codes) 0 1 2 3 4 5 6 7 8 9 A B C D E F --------------------------------- 2 | ! " # $ % & ' ( ) * + , - . / 3 | 0 1 2 3 4 5 6 7 8 9 : ; < = > ? 4 | @ A B C D E F G H I J K L M N O 5 | P Q R S T U V W X Y Z [ ] ^ _ 6 | ` a b c d e f g h i j k l m n o 7 | p q r s t u v w x y z { | } ~
  • 5. ASCII has been extensively enhanced. Modern systems use Unicode, which is a 2- byte 16-bit system.
  • 7. HOW DATA IS MANIPULATED AND CONTROLLED Disk Operating Systems
  • 8. DOS provides the prime means of interaction between the user and the computer hardware. The command interface (DOS prompt) converts keyboard commands into instructions understood by the machine hardware. Without DOS there is no means of interpreting input commands. The GUI "sits" on top of DOS and provides a graphical equivalent of keyboard commands. Windows - written by Microsoft for PC's. UNIX and UNIX clones, eg. Linux, Apple http://en.wikipedia.org/wiki/Operating_system http://upload.wikimedia.org/wikipedia/commons/7/77/Unix_history-simple.svg
  • 9. HOW THE OPERATING SYSTEM IS STARTED THE BOOT PROCESS Turning on the POWER switch ("Cold start") Simultaneously pressing CTRL, ALT and DELETE ("Soft start") The boot process is controlled by the Boot ROM, located on the motherboard, which contains part of the BIOS. Functions of Boot ROM: ● Checks hardware ● RAM check ● Looks for a boot disk
  • 10. The Boot Loader • The BIOS loads into memory the program residing in the first sector of the boot device, called the Master Boot Record or MBR. • The MBR is only 512 bytes in size and contains machine code instructions for booting the machine, called a boot loader, along with the partition table which holds the information on how the partitions, containing file systems, are organised on the drive. • Once the BIOS finds and loads the boot loader program into memory, it yields control of the boot process to it, from which the operating system can be located and run up. http://en.wikipedia.org/wiki/Master_Boot_Record http://en.wikipedia.org/wiki/Booting#Modern_boot_loaders
  • 11. The File System A file system controls how data is stored and retrieved. The data is stored individually and named, called a "file". The structure and logic of the file storage is called a "file system". There are dozens of different systems available, and unassociated operating systems use unrelated file systems. For instance, • MS Windows uses NTFS • Linux uses ext4 Among the most important aspects of filesystems is understanding how filenames and access permissions are treated on the two most common OS's, ie. MS and UNIX / Linux
  • 12. Comparison of filenaming conventions UNIX Files | Windows files -------------------------|---------------------------- 256 characters filename | 256 character filename filename.ext.ext.ext | 3 character extension sensitive to case | not sensitive to case Windows: k:drivespace Unix: /home/user/webspace/images WWW: http://news.bbc.co.uk/1/hi/sci/tech/default.stm Note: Internet web URLs follow Unix filename conventions
  • 13. Microsoft file names Older MS-DOS formatted filenames can contain no more than 8 characters, and these must not contain any command characters. MS Windows now allows long file names and control characters to be used.
  • 14. File extensions ● The file name is followed by a dot . which separates it from its extension. ● The file extension is 3 characters long and describes the type of file. *.COM - Command file. Runs from the DOS prompt. Small file =<64 KB *.EXE - Executable file. Larger file >= 64 KB *.SYS - System file. Installed in memory using an installation program. *.BAT - Batch File. Contains series of text commands batched together. Other extensions are produced typically by application software for their data files, eg .doc, .html, etc. (The * is used here to represent any filename)
  • 15. It is bad practice to use control characters in a file name.. When transferring files to INTERNET systems, the filenames should be re-formatted to comply with UNIX standards. No character is allowed which the system uses for commands or other functions, such as , /, ., etc. The underscore character _ is accepted as a separator as a space must not be used. URL encoding is needed if a filename and path contains control characters.
  • 16. Web URLs use hexadecimal encoding • All URLs address filespace on a web server. • All URLs obey Unix filenaming rules. • All Windows web servers obey Unix filenaming rules. • There are no exceptions at all. • All URLs that use Windows filenames have to be 'repaired' using URL encoding before they work on the web. 'What are those "%20" codes in URLs?' http://www.blooberry.com/indexdot/html/topics/urlencoding.htm "...Only alphanumerics [0-9a-zA-Z], the special characters "$-_.+!*'()," [not including the quotes], and reserved characters used for their reserved purposes may be used unencoded within a URL." http://www.w3schools.com/tags/ref_urlencode.asp Spaces are converted into plus (+) signs or %20 to avoid semantic ambiguities. Special characters or 8-bit values are converted into their hexadecimal equivalents and prefaced with a percent sign (%).
  • 17. Windows drive storage The DOS system uses drive letters, such as a: and b: for floppy disk drives c: for the hard disk drive d: or e: for a CD-ROM drive f: onwards for network drives |_ a:____ |_ b: |_ subdirectories |_ c: |_ |_ d: |_ |_ e: |_ f:____ |_ |_ subdirectories