The document summarizes the ASCII character set. It is split into 3 sections - control codes (0-31), standard characters (32-127), and special/international characters (128-255). The standard characters section includes letters, numbers, punctuation. The control codes section describes codes like newline, tab, carriage return. The special characters section includes accented letters for international languages.
The document discusses how computers represent and encode data and characters. It describes:
- Bits and bytes as the basic units of digital information
- Character codes like ASCII and EBCDIC that represent characters as numeric codes to allow computers to process text
- How ASCII in particular assigns a unique 8-bit binary number to each letter, number, and symbol
EBCDIC code is an 8-bit code used in large computers. It can represent 256 characters with each digit having a binary representation as the numeric portion and zone codes distinguishing character types. The alphabetic characters are divided into three groups with different zone portions of 1100, 1101, and 1110.
This document provides an overview of the Perl programming language. It discusses Perl's history and introduction, beginning with Perl scripts, data types like scalars, lists, arrays, and hashes. It also covers Perl operators, conditional statements, regular expressions, subroutines, and file handling. The document is intended as an introduction to Perl and provides examples of basic Perl syntax and functions.
The document discusses the application layer in computer networking. It describes the client-server model where clients send queries to servers which respond with answers. It also discusses name resolution, where hostnames are translated to IP addresses, and protocols like TCP and UDP which provide transport services. Common applications like email, the web, and peer-to-peer are briefly mentioned as examples.
The document discusses different computer codes used to represent characters, including ASCII, EBCDIC, and BCD codes. It provides details on ASCII codes, explaining that ASCII assigns a unique 7-bit binary number to each letter, number, and punctuation mark. It also discusses how BCD code represents decimal numbers using 4-bit binary and the standard BCD codes assigned to numbers 0-9 and 10-13.
The document discusses how computers represent and encode data and characters. It describes:
- Bits and bytes as the basic units of digital information
- Character codes like ASCII and EBCDIC that represent characters as numeric codes to allow computers to process text
- How ASCII in particular assigns a unique 8-bit binary number to each letter, number, and symbol
EBCDIC code is an 8-bit code used in large computers. It can represent 256 characters with each digit having a binary representation as the numeric portion and zone codes distinguishing character types. The alphabetic characters are divided into three groups with different zone portions of 1100, 1101, and 1110.
This document provides an overview of the Perl programming language. It discusses Perl's history and introduction, beginning with Perl scripts, data types like scalars, lists, arrays, and hashes. It also covers Perl operators, conditional statements, regular expressions, subroutines, and file handling. The document is intended as an introduction to Perl and provides examples of basic Perl syntax and functions.
The document discusses the application layer in computer networking. It describes the client-server model where clients send queries to servers which respond with answers. It also discusses name resolution, where hostnames are translated to IP addresses, and protocols like TCP and UDP which provide transport services. Common applications like email, the web, and peer-to-peer are briefly mentioned as examples.
The document discusses different computer codes used to represent characters, including ASCII, EBCDIC, and BCD codes. It provides details on ASCII codes, explaining that ASCII assigns a unique 7-bit binary number to each letter, number, and punctuation mark. It also discusses how BCD code represents decimal numbers using 4-bit binary and the standard BCD codes assigned to numbers 0-9 and 10-13.
The document discusses the ASCII table, which assigns numeric codes to letters, numbers, punctuation, and control characters to allow computers to use text. It provides a link to an ASCII table and lists additional related links about ASCII codes, charts, standards, and their use in programming.
Perl is a general-purpose programming language created by Larry Wall in 1987. It supports both procedural and object-oriented programming. Perl is useful for tasks like web development, system administration, text processing and more due to its powerful built-in support for text processing and large collection of third-party modules. Basic Perl syntax includes variables starting with $, @, and % for scalars, arrays, and hashes respectively. Conditional and looping constructs like if/else, while, and for are also supported.
The document discusses the programmable unijunction transistor (PUT). It begins by explaining that the PUT consists of 4 layers like a thyristor, with connections to the first, last, and inner layers as the anode, cathode, and gate. PUTs require an external resistor network to set the intrinsic standoff ratio η, similarly to how external resistors program unijunction transistors. The document then covers the basic operation and characteristic curves of PUTs, which resemble those of unijunction transistors. It presents an example PUT relaxation oscillator circuit and discusses design considerations for the charging resistor values.
This document discusses several digital coding systems including BCD, excess-3, EBCDIC, error detection codes, Unicode, ASCII, extended ASCII, and Gray code. It provides details on each code such as the number of bits used, the symbols represented, and how the codes are derived. For example, it explains that BCD represents each decimal digit with 4 bits and excess-3 code is obtained by adding 3 to the BCD number. It also covers topics like parity bits for error detection and the properties of Gray code.
Part of Lecture series on EE321N, Power Electronics-I delivered by me during Fifth Semester of B.Tech. Electrical Engg., 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Please comment and feel free to ask anything related. Thanks!
Ladder diagrams are a type of graphic language used to represent logic systems for industrial control. They resemble a ladder, with two vertical power rails and circuits connected horizontally in rungs. Standard symbols are used to represent components like switches, relays, and outputs. Logic functions like AND, OR, and NOT can be depicted using these symbols. Ladder diagrams are used to program PLCs and show control circuits for machines, depicting inputs, logic functions, and outputs.
This document discusses thyristor devices, specifically silicon controlled rectifiers (SCRs). It describes the basic structure and operation of SCRs, including how they are turned on through their gate and turned off by reducing their anode current. The document outlines various ratings of SCRs such as current, voltage, and switching ratings. It also discusses how SCRs can be connected in series and parallel and describes different gate triggering and commutation circuits used to control SCR operation. Finally, it briefly introduces some other types of thyristor devices.
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
The document discusses data representation and the ASCII character encoding standard. It explains that ASCII uses 7-bit codes to represent text characters, with the 128 possible codes divided between 95 graphic characters and 33 control codes. Each character is assigned a unique binary code and decimal/hexadecimal value. "Hello, world" is given as an example of how text is converted to binary codes under the ASCII standard.
This document provides an overview of the Perl programming language. It covers what Perl is, how to create and run Perl scripts, scalar and array variables, hashes, control structures like if/else and loops, file operations, and common Perl functions like split and join. Advanced Perl concepts like subroutines, regular expressions, and object-oriented programming are also mentioned. Resources for learning more about Perl like documentation, books, and mailing lists are provided at the end.
Linear programming is a mathematical modeling technique used to determine optimal resource allocation to achieve objectives. It involves converting a problem into a linear mathematical model with decision variables, constraints, and an objective function. The optimal solution is found by systematically increasing the objective function value until infeasibility is reached. For example, a linear programming model was used to determine the optimal production mix and levels of two drug combinations to maximize profit given resource constraints. The optimal solution was found to be 320 dozen of drug X1 and 360 dozen of drug X2, utilizing all available resources and achieving $4,360 in weekly profit.
The document discusses the architecture of microprocessors, specifically the 8085 microprocessor. It describes the three busses (address, data, control) used by the 8085 and how they function. It then explains the internal architecture of the 8085 including registers like the program counter and stack pointer. Finally, it discusses memory organization and how the microprocessor accesses and reads/writes to memory locations.
This document outlines the basics of assembly language, including basic elements, statements, program data, variables, constants, instructions, translation to assembly language, and program structure. It discusses statement syntax, valid names, operation and operand fields. It also covers common instructions like MOV, ADD, SUB, INC, DEC, and NEG. Finally, it discusses program segments, memory models, and how to define the data, stack, and code segments.
Introduction to Information Technology Lecture 3MikeCrea
The document discusses different data formats used by computers to represent human data. It covers alphanumeric data formats like ASCII, EBCDIC, and Unicode which allow computers to process letters, numbers and other characters. It also describes common data representations for different data types like images, audio, video and more. Control codes are discussed which are used to control output and communication. Data conversion and representation methods allow human data to be stored and processed in binary format by computers.
Data Formats used by Computers
ISO – International Standards Organization
CSA – Canadian Standards Association
ANSI – American National Standards Institute
IEEE – Institute for Electrical and Electronics Engineers
This document contains a table providing current load ratings for aluminum busbars according to DIN 43670. The table lists allowable continuous current loads in amps for busbars of varying widths and thicknesses, ranging from 12x2mm to 200x10mm. It also specifies whether the busbars are coated or uncoated and the number of busbars. A remark notes the table provides ratings according to DIN regulations for interior systems at specific temperature conditions and busbar spacing/layout. Other ambient temperature values and reduction factors for different applications are also included in DIN 43670.
The document provides instructions for navigating an interactive schematic:
- The Bookmarks panel allows quick navigation to points of interest in the schematic and machine views.
- Clicking blue underlined text hyperlinks can be used to navigate.
- A button in the top right of machine views makes all callouts visible.
This document discusses string lining curves to measure middle ordinate (MO) tolerances. It provides instructions on marking stations along a curve, measuring MOs, recording data, analyzing the results through graphing and trial-and-error in Excel, and determining any necessary track adjustments. Proper string lining ensures uniform curve geometry and helps identify problem areas that may not be visible otherwise.
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S.
This document provides information about steel reinforcement and associated concrete products available from BRC, the UK's largest supplier. It includes details on cut and bent reinforcement bars in various sizes, as well as prefabricated reinforcement solutions. Product categories covered include bar and fabric products, spacers and accessories, slab products, formwork, and weldmesh and gabions. Technical specifications are provided for reinforcement bars, including properties, radius of bending, tolerances, and weight per square meter at different spacings. Contact information is given for BRC sales offices located across the UK.
BarcodeSCAN V120 To scann Bills for Oil vending Machine.pdfAdithyaAR5
This document configures communication initialization and protocol for a PLC. It initializes COM ports, configures protocols, and copies received data buffers for display. String parsing separates received data into left and right parts for storage in memory locations to be displayed on an HMI.
Project Management: The Role of Project Dashboards.pdfKarya Keeper
Project management is a crucial aspect of any organization, ensuring that projects are completed efficiently and effectively. One of the key tools used in project management is the project dashboard, which provides a comprehensive view of project progress and performance. In this article, we will explore the role of project dashboards in project management, highlighting their key features and benefits.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
The document discusses the ASCII table, which assigns numeric codes to letters, numbers, punctuation, and control characters to allow computers to use text. It provides a link to an ASCII table and lists additional related links about ASCII codes, charts, standards, and their use in programming.
Perl is a general-purpose programming language created by Larry Wall in 1987. It supports both procedural and object-oriented programming. Perl is useful for tasks like web development, system administration, text processing and more due to its powerful built-in support for text processing and large collection of third-party modules. Basic Perl syntax includes variables starting with $, @, and % for scalars, arrays, and hashes respectively. Conditional and looping constructs like if/else, while, and for are also supported.
The document discusses the programmable unijunction transistor (PUT). It begins by explaining that the PUT consists of 4 layers like a thyristor, with connections to the first, last, and inner layers as the anode, cathode, and gate. PUTs require an external resistor network to set the intrinsic standoff ratio η, similarly to how external resistors program unijunction transistors. The document then covers the basic operation and characteristic curves of PUTs, which resemble those of unijunction transistors. It presents an example PUT relaxation oscillator circuit and discusses design considerations for the charging resistor values.
This document discusses several digital coding systems including BCD, excess-3, EBCDIC, error detection codes, Unicode, ASCII, extended ASCII, and Gray code. It provides details on each code such as the number of bits used, the symbols represented, and how the codes are derived. For example, it explains that BCD represents each decimal digit with 4 bits and excess-3 code is obtained by adding 3 to the BCD number. It also covers topics like parity bits for error detection and the properties of Gray code.
Part of Lecture series on EE321N, Power Electronics-I delivered by me during Fifth Semester of B.Tech. Electrical Engg., 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Please comment and feel free to ask anything related. Thanks!
Ladder diagrams are a type of graphic language used to represent logic systems for industrial control. They resemble a ladder, with two vertical power rails and circuits connected horizontally in rungs. Standard symbols are used to represent components like switches, relays, and outputs. Logic functions like AND, OR, and NOT can be depicted using these symbols. Ladder diagrams are used to program PLCs and show control circuits for machines, depicting inputs, logic functions, and outputs.
This document discusses thyristor devices, specifically silicon controlled rectifiers (SCRs). It describes the basic structure and operation of SCRs, including how they are turned on through their gate and turned off by reducing their anode current. The document outlines various ratings of SCRs such as current, voltage, and switching ratings. It also discusses how SCRs can be connected in series and parallel and describes different gate triggering and commutation circuits used to control SCR operation. Finally, it briefly introduces some other types of thyristor devices.
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
The document discusses data representation and the ASCII character encoding standard. It explains that ASCII uses 7-bit codes to represent text characters, with the 128 possible codes divided between 95 graphic characters and 33 control codes. Each character is assigned a unique binary code and decimal/hexadecimal value. "Hello, world" is given as an example of how text is converted to binary codes under the ASCII standard.
This document provides an overview of the Perl programming language. It covers what Perl is, how to create and run Perl scripts, scalar and array variables, hashes, control structures like if/else and loops, file operations, and common Perl functions like split and join. Advanced Perl concepts like subroutines, regular expressions, and object-oriented programming are also mentioned. Resources for learning more about Perl like documentation, books, and mailing lists are provided at the end.
Linear programming is a mathematical modeling technique used to determine optimal resource allocation to achieve objectives. It involves converting a problem into a linear mathematical model with decision variables, constraints, and an objective function. The optimal solution is found by systematically increasing the objective function value until infeasibility is reached. For example, a linear programming model was used to determine the optimal production mix and levels of two drug combinations to maximize profit given resource constraints. The optimal solution was found to be 320 dozen of drug X1 and 360 dozen of drug X2, utilizing all available resources and achieving $4,360 in weekly profit.
The document discusses the architecture of microprocessors, specifically the 8085 microprocessor. It describes the three busses (address, data, control) used by the 8085 and how they function. It then explains the internal architecture of the 8085 including registers like the program counter and stack pointer. Finally, it discusses memory organization and how the microprocessor accesses and reads/writes to memory locations.
This document outlines the basics of assembly language, including basic elements, statements, program data, variables, constants, instructions, translation to assembly language, and program structure. It discusses statement syntax, valid names, operation and operand fields. It also covers common instructions like MOV, ADD, SUB, INC, DEC, and NEG. Finally, it discusses program segments, memory models, and how to define the data, stack, and code segments.
Introduction to Information Technology Lecture 3MikeCrea
The document discusses different data formats used by computers to represent human data. It covers alphanumeric data formats like ASCII, EBCDIC, and Unicode which allow computers to process letters, numbers and other characters. It also describes common data representations for different data types like images, audio, video and more. Control codes are discussed which are used to control output and communication. Data conversion and representation methods allow human data to be stored and processed in binary format by computers.
Data Formats used by Computers
ISO – International Standards Organization
CSA – Canadian Standards Association
ANSI – American National Standards Institute
IEEE – Institute for Electrical and Electronics Engineers
This document contains a table providing current load ratings for aluminum busbars according to DIN 43670. The table lists allowable continuous current loads in amps for busbars of varying widths and thicknesses, ranging from 12x2mm to 200x10mm. It also specifies whether the busbars are coated or uncoated and the number of busbars. A remark notes the table provides ratings according to DIN regulations for interior systems at specific temperature conditions and busbar spacing/layout. Other ambient temperature values and reduction factors for different applications are also included in DIN 43670.
The document provides instructions for navigating an interactive schematic:
- The Bookmarks panel allows quick navigation to points of interest in the schematic and machine views.
- Clicking blue underlined text hyperlinks can be used to navigate.
- A button in the top right of machine views makes all callouts visible.
This document discusses string lining curves to measure middle ordinate (MO) tolerances. It provides instructions on marking stations along a curve, measuring MOs, recording data, analyzing the results through graphing and trial-and-error in Excel, and determining any necessary track adjustments. Proper string lining ensures uniform curve geometry and helps identify problem areas that may not be visible otherwise.
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S.
This document provides information about steel reinforcement and associated concrete products available from BRC, the UK's largest supplier. It includes details on cut and bent reinforcement bars in various sizes, as well as prefabricated reinforcement solutions. Product categories covered include bar and fabric products, spacers and accessories, slab products, formwork, and weldmesh and gabions. Technical specifications are provided for reinforcement bars, including properties, radius of bending, tolerances, and weight per square meter at different spacings. Contact information is given for BRC sales offices located across the UK.
BarcodeSCAN V120 To scann Bills for Oil vending Machine.pdfAdithyaAR5
This document configures communication initialization and protocol for a PLC. It initializes COM ports, configures protocols, and copies received data buffers for display. String parsing separates received data into left and right parts for storage in memory locations to be displayed on an HMI.
Project Management: The Role of Project Dashboards.pdfKarya Keeper
Project management is a crucial aspect of any organization, ensuring that projects are completed efficiently and effectively. One of the key tools used in project management is the project dashboard, which provides a comprehensive view of project progress and performance. In this article, we will explore the role of project dashboards in project management, highlighting their key features and benefits.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...kalichargn70th171
In today's fiercely competitive mobile app market, the role of the QA team is pivotal for continuous improvement and sustained success. Effective testing strategies are essential to navigate the challenges confidently and precisely. Ensuring the perfection of mobile apps before they reach end-users requires thoughtful decisions in the testing plan.
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid
IBM watsonx Code Assistant for Z, our latest Generative AI-assisted mainframe application modernization solution. Mainframe (IBM Z) application modernization is a topic that every mainframe client is addressing to various degrees today, driven largely from digital transformation. With generative AI comes the opportunity to reimagine the mainframe application modernization experience. Infusing generative AI will enable speed and trust, help de-risk, and lower total costs associated with heavy-lifting application modernization initiatives. This document provides an overview of the IBM watsonx Code Assistant for Z which uses the power of generative AI to make it easier for developers to selectively modernize COBOL business services while maintaining mainframe qualities of service.
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...kalichargn70th171
In today's business landscape, digital integration is ubiquitous, demanding swift innovation as a necessity rather than a luxury. In a fiercely competitive market with heightened customer expectations, the timely launch of flawless digital products is crucial for both acquisition and retention—any delay risks ceding market share to competitors.
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
How Can Hiring A Mobile App Development Company Help Your Business Grow?
Ascii codes 3145_app_f
1. The ASCII Character Set
The American Standard Code for Information Interchange or ASCII
assigns values between 0 and 255 for upper and lower case letters, numeric digits,
punctuation marks and other symbols. ASCII characters can be split into the following sections:
❑ 0 – 31 Control codes
❑ 32 – 127 Standard, implementation-independent characters
❑ 128 – 255 Special symbols, international character sets – generally,
non-standard characters.
Control Codes : ASCII Characters 0 - 31
The following table lists and describes the first 32 ASCII characters, often referred to as control codes.
The columns show the decimal and hexadecimal ASCII values for each code along with their
abbreviated and full names. Descriptions are given to those most in use today.
Decimal Octal Hexadecimal Code Description
000 000 00 NUL Null
001 001 01 SOH Start Of Heading
002 002 02 STX Start of TeXt
003 003 03 ETX End of TeXt
004 004 04 EOT End Of Transmission
005 005 05 ENQ ENQuiry
006 006 06 ACK ACKnowledge
Table continued on following page
2. Appendix F
586
Decimal Octal Hexadecimal Code Description
007 007 07 BEL BELl. Caused teletype machines to ring a bell.
Causes a beep in many common terminals and
terminal emulation programs.
008 010 08 BS BackSpace. Moves the cursor move backwards
(left) one space.
009 011 09 HT Horizontal Tab. Moves the cursor right to the
next tab stop. The spacing of tab stops is
dependent on the output device, but is often
either 8 or 10 characters wide.
010 012 0A LF Line Feed. Moves the cursor to a new line. On
Unix systems, moves to a new line AND all the
way to the left.
011 013 0B VT Vertical Tab
012 014 0C FF Form Feed. Advances paper to the top of the
next page (if the output device is a printer).
013 015 0D CR Carriage Return. Moves the cursor all the
way to the left, but does not advance to the
next line.
014 016 0E SO Shift Out
015 017 0F SI Shift In
016 020 10 DLE Data Link Escape
017 021 11 DC1 Device Control 1
018 022 12 DC2 Device Control 2
019 023 13 DC3 Device Control 3
020 024 14 DC4 Device Control 4
021 025 15 NAK Negative AcKnowledge
022 026 16 SYN SYNchronous idle
023 027 17 ETB End of Transmission Block
024 030 18 CAN CANcel
025 031 19 EM End of Medium
026 032 1A SUB SUBstitute
027 033 1B ESC ESCape
028 034 1C FS File Separator
3. The ASCII Character Set
587
Decimal Octal Hexadecimal Code Description
029 035 1D GS Group Separator
030 036 1E RS Record Separator
031 037 1F US Unit Separator
The Standard ASCII Characters : 32 - 127
ASCII Characters 32 - 127 are the standard, implementation-independent alphanumeric characters we
work with every day. The tables below show the characters along with both their decimal and
hexadecimal ASCII values.
Characters 32 - 64
The first table, which contains characters 32 - 64, contains the majority of the standard symbolic
characters and the numbers from zero to nine.
Decimal Octal Hexadecimal Character Decimal Octal Hexadecimal Character
032 040 20 Space 049 061 31 1
033 041 21 ! 050 062 32 2
034 042 22 " 051 063 33 3
035 043 23 # 052 064 34 4
036 044 24 $ 053 065 35 5
037 045 25 % 054 066 36 6
038 046 26 & 055 067 37 7
039 047 27 ' 056 070 38 8
040 050 28 ( 057 071 39 9
041 051 29 ) 058 072 3A :
042 052 2A * 059 073 3B ;
043 053 2B + 060 074 3C <
044 054 2C , 061 075 3D =
045 055 2D - 062 076 3E >
046 056 2E . 063 077 3F ?
047 057 2F / 064 100 40 @
048 060 30 0
4. Appendix F
588
Characters 65 - 127
The second table, which contains characters 65 - 127, contains the standard Latin alphabet characters
both lower and upper case, separated only by a few characters at 91 - 96 and 123 - 127.
Decimal Octal Hexadecimal Character Decimal Octal Hexadecimal Character
065 101 41 A 097 141 61 a
066 102 42 B 098 142 62 b
067 103 43 C 099 143 63 c
068 104 44 D 100 144 64 d
069 105 45 E 101 145 65 e
070 106 46 F 102 146 66 f
071 107 47 G 103 147 67 g
072 110 48 H 104 150 68 h
073 111 49 I 105 151 69 i
074 112 4A J 106 152 6A j
075 113 4B K 107 153 6B k
076 114 4C L 108 154 6C l
077 115 4D M 109 155 6D m
078 116 4E N 110 156 6E n
079 117 4F O 111 157 6F o
080 120 50 P 112 160 70 p
081 121 51 Q 113 161 71 q
082 122 52 R 114 162 72 r
083 123 53 S 115 163 73 s
084 124 54 T 116 164 74 t
085 125 55 U 117 165 75 u
086 126 56 V 118 166 76 v
087 127 57 W 119 167 77 w
088 130 58 X 120 170 78 x
089 131 59 Y 121 171 79 y
090 132 5A Z 122 172 7A z
7. The ASCII Character Set
591
Decimal Octal Hexadecimal Character Decimal Octal Hexadecimal Character
197 305 C5 Å 229 345 E5 å
198 306 C6 Æ 230 346 E6 æ
199 307 C7 Ç 231 347 E7 ç
200 310 C8 È 232 350 E8 è
201 311 C9 É 233 351 E9 é
202 312 CA Ê 234 352 EA ê
203 313 CB Ë 235 353 EB ë
204 314 CC Ì 236 354 EC ì
205 315 CD Í 237 355 ED í
206 316 CE Î 238 356 EE î
207 317 CF Ï 239 357 EF ï
208 320 D0 Ð 240 360 F0 ð
209 321 D1 Ñ 241 361 F1 ñ
210 322 D2 Ò 242 362 F2 ò
211 323 D3 Ó 243 363 F3 ó
212 324 D4 Ô 244 364 F4 ô
213 325 D5 Ö 245 365 F5 õ
214 326 D6 Ö 246 366 F6 ö
215 327 D7 × 247 367 F7 ÷
216 330 D8 Ø 248 370 F8 ø
217 331 D9 Ù 249 371 F9 ù
218 332 DA Ú 250 372 FA ú
219 333 DB Û 251 373 FB û
220 334 DC Ü 252 374 FC ü
221 335 DD Ý 253 375 FD ý
222 336 DE Þ 254 376 FE þ
223 337 DF ß 255 377 FF
8. This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License. To view a copy of this
license, visit http://creativecommons.org/licenses/by-nd-nc/1.0 or send a letter to Creative Commons, 559 Nathan Abbott Way,
Stanford, California 94305, USA.
The key terms of this license are:
Attribution: The licensor permits others to copy, distribute, display, and perform the work. In return, licensees must give the
original author credit.
No Derivative Works: The licensor permits others to copy, distribute, display and perform only unaltered copies of the work --
not derivative works based on it.
Noncommercial: The licensor permits others to copy, distribute, display, and perform the work. In return, licensees may not
use the work for commercial purposes -- unless they get the licensor's permission.