0% found this document useful (0 votes)
4 views

Coding and Cryptography

The document discusses the historical and modern applications of coding and cryptography, highlighting their importance in securing information. It covers various coding schemes, including identification numbers and barcodes, as well as error detection methods like check digits. Additionally, it explains the binary number system as the foundation of digital technology and the evolution of codes from ancient hieroglyphics to contemporary uses.

Uploaded by

Charita Maraon
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Coding and Cryptography

The document discusses the historical and modern applications of coding and cryptography, highlighting their importance in securing information. It covers various coding schemes, including identification numbers and barcodes, as well as error detection methods like check digits. Additionally, it explains the binary number system as the foundation of digital technology and the evolution of codes from ancient hieroglyphics to contemporary uses.

Uploaded by

Charita Maraon
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Coding and Cryptography

“I stand alone before fifty in Rome. None came before five, the
three invented, and you will be the last.”
Answer to the
Riddle
IL0V YOU

I stand alone
Before fifty in Rome
None came before five,
The tree inverted,
And you will be the last.
Coding and Cryptography

• When Julius Caesar sends his messages to his generals or trusted alliance, he
would make sure that his messages are secured and encrypted.
• This is to make sure that information will not be leaked and only those who
know the algorithm he used can understand the messages.
• Moving forward today, security of information is not only applied to war but in
all possible aspects where vital details need to be concealed.
• However, codes and cryptography does not only apply to the above
mentioned.
• This as well applies to technology, data analytics, and many more. In this
lesson, the purpose and importance of coding and cryptography will be
discussed where we will uncover the its basic applications and how it is used.
Objectives

At the end of this lesson, we must have:

Describe some coding schemes that are used


to assign identification numbers;

Use check digits for error detection;

Discuss the process of discussing data; and

Analyze encrypted data.


Coding and Cryptography
Keeping something secure means making a way that no
one would ever find, but sometimes keeping it beyond
the understanding of others.
Codes not only keep things secure, but as well as keeping
everything in order and systematic.
Instead of writing the entire name of a location, initials
are instead assigned. Instead of the name of the product
itself, a corresponding number is assigned.
Coding and Cryptography
Codes were already around since ancient times.
A code is a symbolic way to represent information.

In qualitative inquiry, a code is most often a word or a


short phrase that symbolically assigns a summative,
salient, essence-capturing, and/or evocative attribute for
a portion of language-based or visual data (Saldana,
2013).
Coding and
Cryptography
What you have seen on the first
part is called the hieroglyphics
or “sacred writings”. These were
by ancient Egyptians in their
writing system.
Hieroglyfic In terms of the number system used, the
Roman Numerals was utilized all over Europe
Numeral until 1600’s. But for the Egyptians, they have
System their own number system.
Roman
Numerical
System
The binary
number system

• The binary system is a number


system that uses only two
values (0,1; on, off) to represent
codes and data.
• Since zero and ones can be
easily represented by two
voltages, the binary system is
the foundation on which digital
technology is built.
Barcodes
• A bacode is an optical, machine-
readable, representation of data.
• Traditional barcodes systematically
represent data by varying the
widths and spacings of parallel
lines, and may be referred to as
linear or one dimensional (1D).
• Later, two-dimensional (2D)
variants were developed, using
rectangles, dots, hexagons and
other geometric patterns, called
matrix codes or 2D barcodes
Uses of Barcodes
It is used for automated data
collection in businesses.
It eliminates the occurrence of
human error since through the use
of a bar scanner, transmitting data
is fast and reliable and takes lesser
time than entering them manually.
• Identification numbers are used to
identify individual items, specific
products, people, account or
documents.

Identification • Examples:
1. Numeric identification
Numbers number – TIN 3 or Tax
Identification #, school ID #,
bank account #
2. Alpha numeric identification
number – vehicle plate,
passwords.
Coding and Cryptography
A check digit or a check sum is used to verify errors on
identification numbers. These are single numbers generated using
the other characters from the identification number.

UNIVERSAL PRODUCT CODE


For the universal product code, the check digit is usually indicated
on the far right of the UPC.
UPC is the barcode which is the identification number of a retail
item such as a grocery product. It consist of 12 digits; the first 11
characters specify the source of the item and the product number.
The twelfth digit is the check digit, typically a modulo 10 check
digit.

You might also like