SlideShare a Scribd company logo
1 of 7
Computer Science
(A Level)
ASCII and Unicode
A binary representation of a
particular letter, number or special
character
(Definitions)
• ASCII stands for “American Standard Code for Information
Interchange”
• It is the most common format for text files in computers on the
internet
• IT MAPS BINARY TO LETTERS/NUMBERS
• It represents text which makes it possible to transfer data from
one computer to another
• ASCII was used to facilitate communication between computers
by using the common language code
ASCII
ASCII
Limitations of ASCII
• Can only represent 127 or 255 characters
• Can only code for the standard English language
characters (not for others like Chinese/Arabic)
ASCII Table
• Unicode is an international and multilingual text character and coding
system
• Unicode uses more bits and therefore can be used for more character
combinations
• It was introduced so that lots of different characters from different
languages could be easily represented and entered
• It facilitates communication between devices all around the world
without relying on translation
Unicode
• Joe Becker published a draft of Unicode in August 1988.
Companies such as Apple and Xerox were involved in its creation
Unicode
UTF – 8 = Extended ASCII
= 8 Bits
UTF – 16 = Expands to western languages
= 16 Bits
UTF – 32 = Most complete character set
= 32 Bits
UNICODE:

More Related Content

What's hot

4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-asciiirdginfo
 
Lecture ascii and ebcdic codes
Lecture ascii and ebcdic codesLecture ascii and ebcdic codes
Lecture ascii and ebcdic codesYazdan Yousafzai
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptAlula Tafere
 
Programming language
Programming languageProgramming language
Programming languageRajThakuri
 
Presentation on storage devices
Presentation on storage devicesPresentation on storage devices
Presentation on storage devicesNouman Riaz
 
computer software
computer softwarecomputer software
computer softwareAhsan Khan
 
Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Lovely Singh
 
Introduction to programming
Introduction to programmingIntroduction to programming
Introduction to programmingNeeru Mittal
 
ASCII and Unicode.pptx
ASCII and Unicode.pptxASCII and Unicode.pptx
ASCII and Unicode.pptxKhalilJary
 
How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?Paula Perkovic
 
binary number system
 binary number system binary number system
binary number systemvishal gupta
 

What's hot (20)

Operating system basics
Operating system basicsOperating system basics
Operating system basics
 
4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-ascii
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Fundamental of Computers
Fundamental of ComputersFundamental of Computers
Fundamental of Computers
 
Lecture ascii and ebcdic codes
Lecture ascii and ebcdic codesLecture ascii and ebcdic codes
Lecture ascii and ebcdic codes
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Programming language
Programming languageProgramming language
Programming language
 
Data Representation
Data RepresentationData Representation
Data Representation
 
Presentation on storage devices
Presentation on storage devicesPresentation on storage devices
Presentation on storage devices
 
Number system conversion
Number system conversionNumber system conversion
Number system conversion
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
computer software
computer softwarecomputer software
computer software
 
Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)
 
Introduction to programming
Introduction to programmingIntroduction to programming
Introduction to programming
 
ASCII and Unicode.pptx
ASCII and Unicode.pptxASCII and Unicode.pptx
ASCII and Unicode.pptx
 
Computer-codes.pptx
Computer-codes.pptxComputer-codes.pptx
Computer-codes.pptx
 
How Does a Computer Work?
How Does a Computer Work?How Does a Computer Work?
How Does a Computer Work?
 
Motherboard ppt
Motherboard pptMotherboard ppt
Motherboard ppt
 
binary number system
 binary number system binary number system
binary number system
 
Cpu ppt cse
Cpu ppt cseCpu ppt cse
Cpu ppt cse
 

Viewers also liked

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals SamiHsDU
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codesHareem Aslam
 
Comp codes (ascii...).24to25
Comp codes (ascii...).24to25Comp codes (ascii...).24to25
Comp codes (ascii...).24to25myrajendra
 
Character representation
Character representationCharacter representation
Character representationreegangoodwin1
 
Unicode and character sets
Unicode and character setsUnicode and character sets
Unicode and character setsrenchenyu
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsRay Paseur
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codesIIUI
 
Character expression
Character expressionCharacter expression
Character expressionxhaed123
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionSeda Yalçın
 
How Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCIIHow Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCIISimon Courtois
 
Parity bits
Parity bitsParity bits
Parity bitsmrhaken
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Project Student
 

Viewers also liked (20)

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Unicode 101
Unicode 101Unicode 101
Unicode 101
 
Comp codes (ascii...).24to25
Comp codes (ascii...).24to25Comp codes (ascii...).24to25
Comp codes (ascii...).24to25
 
Ascii
AsciiAscii
Ascii
 
Unicode
UnicodeUnicode
Unicode
 
Character representation
Character representationCharacter representation
Character representation
 
Unicode and character sets
Unicode and character setsUnicode and character sets
Unicode and character sets
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set Collisions
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Hadoop In The Real World
Hadoop In The Real WorldHadoop In The Real World
Hadoop In The Real World
 
Character Sets
Character SetsCharacter Sets
Character Sets
 
Character expression
Character expressionCharacter expression
Character expression
 
ASCII-EBCDIC-HEX
ASCII-EBCDIC-HEXASCII-EBCDIC-HEX
ASCII-EBCDIC-HEX
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
 
How Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCIIHow Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCII
 
Parity bits
Parity bitsParity bits
Parity bits
 
ASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All CharactersASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All Characters
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Similar to Ascii and Unicode (Character Codes)

Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabetsRazinaShamim
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesMilind Patil
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptxRithinA1
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)Pramila Selvaraj
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfFashionBoutiquedelhi
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)Fizaril Amzari Omar
 
4 character encoding
4 character encoding4 character encoding
4 character encodingirdginfo
 
Internationalisation And Globalisation
Internationalisation And GlobalisationInternationalisation And Globalisation
Internationalisation And GlobalisationAlan Dean
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRRGHOTRAANGEL
 
Understanding Character Encodings
Understanding Character EncodingsUnderstanding Character Encodings
Understanding Character EncodingsMobisoft Infotech
 

Similar to Ascii and Unicode (Character Codes) (20)

Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabets
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Unicode
UnicodeUnicode
Unicode
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptx
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdf
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
 
Storing text
Storing textStoring text
Storing text
 
Uncdtalk
UncdtalkUncdtalk
Uncdtalk
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
data representation
data representationdata representation
data representation
 
Representation of Text
Representation of TextRepresentation of Text
Representation of Text
 
Tokens_C
Tokens_CTokens_C
Tokens_C
 
4 character encoding
4 character encoding4 character encoding
4 character encoding
 
Internationalisation And Globalisation
Internationalisation And GlobalisationInternationalisation And Globalisation
Internationalisation And Globalisation
 
Intro compute
Intro computeIntro compute
Intro compute
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRR
 
Intro compute
Intro computeIntro compute
Intro compute
 
Understanding Character Encodings
Understanding Character EncodingsUnderstanding Character Encodings
Understanding Character Encodings
 

More from Project Student

Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Project Student
 
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Project Student
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)Project Student
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Project Student
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Project Student
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Project Student
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming LanguagesProject Student
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Project Student
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Project Student
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Project Student
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Project Student
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practicesProject Student
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Project Student
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Project Student
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureProject Student
 
Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / TranslatorsProject Student
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine CodeProject Student
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)Project Student
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Project Student
 

More from Project Student (20)

Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)
 
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming Languages
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practices
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / Translators
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine Code
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Ascii and Unicode (Character Codes)

  • 2. A binary representation of a particular letter, number or special character (Definitions)
  • 3. • ASCII stands for “American Standard Code for Information Interchange” • It is the most common format for text files in computers on the internet • IT MAPS BINARY TO LETTERS/NUMBERS • It represents text which makes it possible to transfer data from one computer to another • ASCII was used to facilitate communication between computers by using the common language code ASCII
  • 4. ASCII Limitations of ASCII • Can only represent 127 or 255 characters • Can only code for the standard English language characters (not for others like Chinese/Arabic)
  • 6. • Unicode is an international and multilingual text character and coding system • Unicode uses more bits and therefore can be used for more character combinations • It was introduced so that lots of different characters from different languages could be easily represented and entered • It facilitates communication between devices all around the world without relying on translation Unicode
  • 7. • Joe Becker published a draft of Unicode in August 1988. Companies such as Apple and Xerox were involved in its creation Unicode UTF – 8 = Extended ASCII = 8 Bits UTF – 16 = Expands to western languages = 16 Bits UTF – 32 = Most complete character set = 32 Bits UNICODE: