Professional Documents
Culture Documents
For example:
Binary: All computers process data in digital form. This means that the processor inside a computer works by manipulating zeros
and ones, known as binary code. The term data representation refers to the way that binary codes are used to represent
different types of data.
As well as working with numbers, computers also have to handle text, graphics, sounds and films. The computer can only deal
with all these different types of information if they are in binary form. This means that there has to be a method for converting
all this information into binary code, into zeros and ones.
ASCII: ASCII (pronounces as-kee) stands for the American Standard Code for Information Interchange and is a system developed
in the 1960s for transferring data electronically. The original version was a 7-bit code, although more modern versions use more
bits. ASCII has a binary code for all of the characters in the English language as well as special characters.
For Example:
Encryption: Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily
understood by anyone except authorized parties.
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or
transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security
assurance of IT systems and communications as they can provide not only confidentiality, but also the following key
elements of security:
The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to
mid-twentieth century to protect commercial, diplomatic and military communication. Enigma was invented by
the German engineer Arthur Scherbius at the end of World War I.[1] Early models were used commercially from the
early 1920s, and adopted by military and government services of several countries, most notably Nazi
Germany before and during World War II.[2] Several different Enigma models were produced, but the German
military models, having a plugboard, were the most complex. Japanese and Italian models were also in use.
Breaking Code:
The Enigma code was first broken by the polish cipher Bureau in 1932. Three Polish Cryptologists Marian Rejewski,
Jerzy Rozycki and Henryk Zygalski worked it out suing mathematics and information supplied by French military
intelligence.
The cypher is the algorithm used to encrypt and decrypt a message. We know the cypher used and how the
encryption was performed but, without the key to decrypt the cyphertext, we cannot turn it into plain text.
The reverse cipher encrypts a message by printing it in reverse order. So Hello world! encrypts to !dlrow
olleH. To decrypt, you simply reverse the reversed message to get the original message. The encryption
and decryption steps are the same.
The reverse cipher is a very weak cipher. Just by looking at its cyphertext you can figure out it is just in
reverse order.
For example:
.syas ti tahw tuo erugif llits ylbaborp nac uoy ,detpyrcne si siht hguoht neve ,elpmaxe roF
For Example, even thought this is encrypted, you can probably still figure out what it says.
The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a
substitution cipher where each letter in the original message (called the plaintext) is replaced with a
letter corresponding to a certain number of letters up or down in the alphabet.
Plaintext:
Ciphertext:
The ciphertext alphabet is sometimes different from the plaintext alphabet; for example, in the pigpen cipher, the
ciphertext consists of a set of symbols derived from a grid. For example:
Such features make little difference to the security of a scheme, however at the very least, any set of strange
symbols can be transcribed back into an A-Z alphabet and dealt with as normal.
In lists and catalogues for salespeople, a very simple encryption is sometimes used to replace numeric digits by
letters.
Plaintext digits: 1234567890
W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .
1. DEC2BIN
=DEC2BIN(NUMBER)
For Example:
=DEC2BIN(89) 1011001
2. BIN2DEC
=BIN2DEC(NUMBER)
Converts a binary number to decimal.
For Example:
=BIN2DEC(101100) 44
3. CHAR
=CHAR(NUMBER)
Returns the character specified by the code number from the character set for your computer.
For Example:
=CHAR(35) #
2. IF:
The IF function is one of the most popular functions in Excel, and it allows you to make logical
comparisons between a value and what you expect. In its simplest form, the IF function says:
So an IF statement can have two results. The first result is if your comparison is True, the second if
your comparison is False.
3. Modulo:
Returns the remainder after number is divided by divisor. The result has the same sign as divisor.
Syntax
MOD(number, divisor)
Number Required. The number for which you want to find the remainder.