SlideShare a Scribd company logo
Computer Science
(A Level)
ASCII and Unicode
A binary representation of a
particular letter, number or special
character
(Definitions)
• ASCII stands for “American Standard Code for Information
Interchange”
• It is the most common format for text files in computers on the
internet
• IT MAPS BINARY TO LETTERS/NUMBERS
• It represents text which makes it possible to transfer data from
one computer to another
• ASCII was used to facilitate communication between computers
by using the common language code
ASCII
ASCII
Limitations of ASCII
• Can only represent 127 or 255 characters
• Can only code for the standard English language
characters (not for others like Chinese/Arabic)
ASCII Table
• Unicode is an international and multilingual text character and coding
system
• Unicode uses more bits and therefore can be used for more character
combinations
• It was introduced so that lots of different characters from different
languages could be easily represented and entered
• It facilitates communication between devices all around the world
without relying on translation
Unicode
• Joe Becker published a draft of Unicode in August 1988.
Companies such as Apple and Xerox were involved in its creation
Unicode
UTF – 8 = Extended ASCII
= 8 Bits
UTF – 16 = Expands to western languages
= 16 Bits
UTF – 32 = Most complete character set
= 32 Bits
UNICODE:

More Related Content

What's hot

binary number system
 binary number system binary number system
binary number system
vishal gupta
 
Conversion of number system
Conversion of number systemConversion of number system
Conversion of number system
University of Potsdam
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
Alula Tafere
 
Binary codes
Binary codesBinary codes
Binary codes
Revathi Subramaniam
 
Bcd
BcdBcd
Arrays
ArraysArrays
Data representation
Data representationData representation
Data representation
Prashant Saurabh
 
BINARY NUMBER SYSTEM
BINARY NUMBER SYSTEMBINARY NUMBER SYSTEM
BINARY NUMBER SYSTEM
Zaheer Abbasi
 
Number System in CoMpUtEr
Number System in CoMpUtErNumber System in CoMpUtEr
Number System in CoMpUtEr
vishal bansal
 
Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)
Lovely Singh
 
Binary to Decimal Conversion
Binary to Decimal ConversionBinary to Decimal Conversion
Binary to Decimal Conversion
Neelanjan Bhattacharyya
 
Number Systems
Number SystemsNumber Systems
Number Systems
Jubayer Alam Shoikat
 
Codes
CodesCodes
Logic gates ppt
Logic gates pptLogic gates ppt
Logic gates ppt
parassini
 
Boolean+logic
Boolean+logicBoolean+logic
Boolean+logic
Bilal Maqbool ツ
 
What is an algorithm?
What is an algorithm?What is an algorithm?
What is an algorithm?
Angela DeHart
 
1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL
Buxoo Abdullah
 
Binary code
Binary codeBinary code
Binary code
Juzen1600101
 

What's hot (20)

binary number system
 binary number system binary number system
binary number system
 
Conversion of number system
Conversion of number systemConversion of number system
Conversion of number system
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Binary codes
Binary codesBinary codes
Binary codes
 
Bcd
BcdBcd
Bcd
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Arrays
ArraysArrays
Arrays
 
Data representation
Data representationData representation
Data representation
 
BINARY NUMBER SYSTEM
BINARY NUMBER SYSTEMBINARY NUMBER SYSTEM
BINARY NUMBER SYSTEM
 
Number system conversion
Number system conversionNumber system conversion
Number system conversion
 
Number System in CoMpUtEr
Number System in CoMpUtErNumber System in CoMpUtEr
Number System in CoMpUtEr
 
Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)Number System (Binary,octal,Decimal,Hexadecimal)
Number System (Binary,octal,Decimal,Hexadecimal)
 
Binary to Decimal Conversion
Binary to Decimal ConversionBinary to Decimal Conversion
Binary to Decimal Conversion
 
Number Systems
Number SystemsNumber Systems
Number Systems
 
Codes
CodesCodes
Codes
 
Logic gates ppt
Logic gates pptLogic gates ppt
Logic gates ppt
 
Boolean+logic
Boolean+logicBoolean+logic
Boolean+logic
 
What is an algorithm?
What is an algorithm?What is an algorithm?
What is an algorithm?
 
1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL1.1.2 HEXADECIMAL
1.1.2 HEXADECIMAL
 
Binary code
Binary codeBinary code
Binary code
 

Viewers also liked

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
SamiHsDU
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
Hareem Aslam
 
Unicode 101
Unicode 101Unicode 101
Unicode 101
Lars Marius Garshol
 
Comp codes (ascii...).24to25
Comp codes (ascii...).24to25Comp codes (ascii...).24to25
Comp codes (ascii...).24to25myrajendra
 
Lecture ascii and ebcdic codes
Lecture ascii and ebcdic codesLecture ascii and ebcdic codes
Lecture ascii and ebcdic codes
Yazdan Yousafzai
 
Ascii
AsciiAscii
Character representation
Character representationCharacter representation
Character representationreegangoodwin1
 
Unicode and character sets
Unicode and character setsUnicode and character sets
Unicode and character setsrenchenyu
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set Collisions
Ray Paseur
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codesIIUI
 
Hadoop In The Real World
Hadoop In The Real WorldHadoop In The Real World
Hadoop In The Real World
MapR Technologies
 
Character Sets
Character SetsCharacter Sets
Character Sets
Leo Hernandez
 
Character expression
Character expressionCharacter expression
Character expression
xhaed123
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
Seda Yalçın
 
How Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCIIHow Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCII
Simon Courtois
 
Parity bits
Parity bitsParity bits
Parity bitsmrhaken
 
ASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All CharactersASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All Characters
Institucion Educativa Privada Claudio Galeno
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)
Project Student
 

Viewers also liked (20)

Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Unicode 101
Unicode 101Unicode 101
Unicode 101
 
Comp codes (ascii...).24to25
Comp codes (ascii...).24to25Comp codes (ascii...).24to25
Comp codes (ascii...).24to25
 
Lecture ascii and ebcdic codes
Lecture ascii and ebcdic codesLecture ascii and ebcdic codes
Lecture ascii and ebcdic codes
 
Ascii
AsciiAscii
Ascii
 
Unicode
UnicodeUnicode
Unicode
 
Character representation
Character representationCharacter representation
Character representation
 
Unicode and character sets
Unicode and character setsUnicode and character sets
Unicode and character sets
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set Collisions
 
Chapter 04 computer codes
Chapter 04 computer codesChapter 04 computer codes
Chapter 04 computer codes
 
Hadoop In The Real World
Hadoop In The Real WorldHadoop In The Real World
Hadoop In The Real World
 
Character Sets
Character SetsCharacter Sets
Character Sets
 
Character expression
Character expressionCharacter expression
Character expression
 
ASCII-EBCDIC-HEX
ASCII-EBCDIC-HEXASCII-EBCDIC-HEX
ASCII-EBCDIC-HEX
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
 
How Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCIIHow Unidecoder Transliterates UTF-8 to ASCII
How Unidecoder Transliterates UTF-8 to ASCII
 
Parity bits
Parity bitsParity bits
Parity bits
 
ASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All CharactersASCII Code with Webdings and Wingdings - All Characters
ASCII Code with Webdings and Wingdings - All Characters
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)
 

Similar to Ascii and Unicode (Character Codes)

Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabets
RazinaShamim
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesMilind Patil
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptx
RithinA1
 
Ascii codes
Ascii codesAscii codes
ASCII and Unicode.pptx
ASCII and Unicode.pptxASCII and Unicode.pptx
ASCII and Unicode.pptx
KhalilJary
 
4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-asciiirdginfo
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)
Pramila Selvaraj
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdf
FashionBoutiquedelhi
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
Fizaril Amzari Omar
 
Storing text
Storing textStoring text
Storing text
missstevenson01
 
Uncdtalk
UncdtalkUncdtalk
data representation
data representationdata representation
data representation
chrispaul8676
 
Representation of Text
Representation of TextRepresentation of Text
Representation of Text
Forrester High School
 
Tokens_C
Tokens_CTokens_C
Tokens_C
Prabhu Govind
 
4 character encoding
4 character encoding4 character encoding
4 character encodingirdginfo
 
Internationalisation And Globalisation
Internationalisation And GlobalisationInternationalisation And Globalisation
Internationalisation And Globalisation
Alan Dean
 
Intro compute
Intro computeIntro compute
Intro compute
Usman Shah
 
Intro compute
Intro computeIntro compute
Intro compute
GHOTRAANGEL
 

Similar to Ascii and Unicode (Character Codes) (20)

Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabets
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Unicode
UnicodeUnicode
Unicode
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptx
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
ASCII and Unicode.pptx
ASCII and Unicode.pptxASCII and Unicode.pptx
ASCII and Unicode.pptx
 
4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-ascii
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdf
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
 
Storing text
Storing textStoring text
Storing text
 
Uncdtalk
UncdtalkUncdtalk
Uncdtalk
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
data representation
data representationdata representation
data representation
 
Representation of Text
Representation of TextRepresentation of Text
Representation of Text
 
Tokens_C
Tokens_CTokens_C
Tokens_C
 
4 character encoding
4 character encoding4 character encoding
4 character encoding
 
Internationalisation And Globalisation
Internationalisation And GlobalisationInternationalisation And Globalisation
Internationalisation And Globalisation
 
Intro compute
Intro computeIntro compute
Intro compute
 
Intro compute
Intro computeIntro compute
Intro compute
 

More from Project Student

Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)
Project Student
 
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Project Student
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)
Project Student
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Project Student
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
Project Student
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)
Project Student
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming Languages
Project Student
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)
Project Student
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Project Student
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Project Student
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)
Project Student
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practices
Project Student
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Project Student
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)
Project Student
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
Project Student
 
Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / Translators
Project Student
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine Code
Project Student
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)
Project Student
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
Project Student
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Project Student
 

More from Project Student (20)

Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)
 
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming Languages
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practices
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / Translators
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine Code
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Ascii and Unicode (Character Codes)

  • 2. A binary representation of a particular letter, number or special character (Definitions)
  • 3. • ASCII stands for “American Standard Code for Information Interchange” • It is the most common format for text files in computers on the internet • IT MAPS BINARY TO LETTERS/NUMBERS • It represents text which makes it possible to transfer data from one computer to another • ASCII was used to facilitate communication between computers by using the common language code ASCII
  • 4. ASCII Limitations of ASCII • Can only represent 127 or 255 characters • Can only code for the standard English language characters (not for others like Chinese/Arabic)
  • 6. • Unicode is an international and multilingual text character and coding system • Unicode uses more bits and therefore can be used for more character combinations • It was introduced so that lots of different characters from different languages could be easily represented and entered • It facilitates communication between devices all around the world without relying on translation Unicode
  • 7. • Joe Becker published a draft of Unicode in August 1988. Companies such as Apple and Xerox were involved in its creation Unicode UTF – 8 = Extended ASCII = 8 Bits UTF – 16 = Expands to western languages = 16 Bits UTF – 32 = Most complete character set = 32 Bits UNICODE: