SlideShare una empresa de Scribd logo
1 de 14
Grade :9
Lesson :1
 It is an acronym for the American Standard Code for Information Interchange.
 It is a standard seven-bit code that was first proposed by the American National
Standards Institute or ANSI in 1963, and finalized in 1968 as ANSI Standard
X3.4.
 The purpose of ASCII was to provide a standard to code various symbols ( visible
and invisible symbols)
 In the ASCII character set, each binary value between 0 and 127 represents a
specific character.
 Most computers extend the ASCII character set to use the full range of 256
characters available in a byte. The upper 128 characters handle special things like
accented characters from common foreign languages.
 In general, ASCII works by assigning standard numeric values to letters,
numbers, punctuation marks and other characters such as control codes.
 An uppercase "A," for example, is represented by the decimal number 65."
 Bytes can represent any collection of items using a “look-up table” approach
 ASCII is used to represent characters
 ASCII American Standard Code for Information Interchange
 By looking at the ASCII table, you can clearly see a one-to-one correspondence
between each character and the ASCII code used.
 For example, 32 is the ASCII code for a space.
 We could expand these decimal numbers out to binary numbers (so 32 = ), if we
wanted to be technically correct -- that is how the computer really deals with
things.
 Computers store text documents, both on disk and in memory, using these ASCII
codes.
 For example, if you use Notepad in Windows XP/2000 to create a text file
containing the words, "Four score and seven years ago," Notepad would use 1 byte
of memory per character (including 1 byte for each space character between the
words -- ASCII character 32).
 When Notepad stores the sentence in a file on disk, the file will also contain 1 byte
per character and per space.
 Binary number is usually displayed as Hexadecimal to save display space
 ASCII is a character encoding scheme that encodes 128 different characters into 7
bit integers
 Computers can only read numbers, so ASCII is a numerical representation of
special characters
 Ex: ‘%’ ‘!’ ‘?’
 Each letter is assigned a number from 0-127
 Ex: An uppercase ‘m’ has the ASCII code of 77
 By 2007, ASCII was the most commonly used character encoding program on the
internet
 In C, single characters are represented using the data type char, which is one of
the most important scalar data types.
 char achar;
 achar=‘A’;
 achar=65;
 A character and an integer (actually a small integer spanning only 8 bits) are
actually indistinguishable on their own. If you want to use it as a char, it will be a
char, if you want to use it as an integer, it will be an integer, as long as you know
how to use proper C++ statements to express your intentions.
 ts main objective is to enable a single, unique character set that is capable of
supporting all characters from all scripts, as well as symbols, that are commonly
utilized for computer processing throughout the globe
 Fun fact: Unicode is capable of encoding about at least 1,110,000 characters!
 Encode text for creation of passwords
 Encode characters used in settings
 Modify characters used in documents
 Encodes characters to display in all webpages

Más contenido relacionado

La actualidad más candente

Programed I/O Modul..
Programed I/O Modul..Programed I/O Modul..
Programed I/O Modul..Myster Rius
 
Control unit
Control unitControl unit
Control unitMdHaque78
 
Types of input-output devices
Types of input-output devicesTypes of input-output devices
Types of input-output devicesriyadingria
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LEDRihab Rahman
 
Introduction to digital logic
Introduction to digital logicIntroduction to digital logic
Introduction to digital logicKamal Acharya
 
basic logic gates
 basic logic gates basic logic gates
basic logic gatesvishal gupta
 
External memory
External memoryExternal memory
External memoryriddhishg
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Registers and-common-bus
Registers and-common-busRegisters and-common-bus
Registers and-common-busAnuj Modi
 
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...Building Block Diagram of Computer | Process of CPU | Input unit | Processing...
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...Uttar Tamang ✔
 
Microprocessors - 80386DX
Microprocessors - 80386DXMicroprocessors - 80386DX
Microprocessors - 80386DXPriyaDYP
 
Introduction to Visual Basic 6.0 Fundamentals
Introduction to Visual Basic 6.0 FundamentalsIntroduction to Visual Basic 6.0 Fundamentals
Introduction to Visual Basic 6.0 FundamentalsSanay Kumar
 

La actualidad más candente (20)

Programed I/O Modul..
Programed I/O Modul..Programed I/O Modul..
Programed I/O Modul..
 
Control unit
Control unitControl unit
Control unit
 
Types of input-output devices
Types of input-output devicesTypes of input-output devices
Types of input-output devices
 
Input output interface
Input output interfaceInput output interface
Input output interface
 
Computer system bus
Computer system busComputer system bus
Computer system bus
 
Blinking a Single LED
Blinking a Single LEDBlinking a Single LED
Blinking a Single LED
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Introduction to digital logic
Introduction to digital logicIntroduction to digital logic
Introduction to digital logic
 
System unit
System unitSystem unit
System unit
 
Visual Basic 6.0
Visual Basic 6.0Visual Basic 6.0
Visual Basic 6.0
 
basic logic gates
 basic logic gates basic logic gates
basic logic gates
 
Karnaugh map
Karnaugh mapKarnaugh map
Karnaugh map
 
External memory
External memoryExternal memory
External memory
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Registers and-common-bus
Registers and-common-busRegisters and-common-bus
Registers and-common-bus
 
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...Building Block Diagram of Computer | Process of CPU | Input unit | Processing...
Building Block Diagram of Computer | Process of CPU | Input unit | Processing...
 
Microprocessors - 80386DX
Microprocessors - 80386DXMicroprocessors - 80386DX
Microprocessors - 80386DX
 
MPMC Unit-1
MPMC Unit-1MPMC Unit-1
MPMC Unit-1
 
Introduction to Visual Basic 6.0 Fundamentals
Introduction to Visual Basic 6.0 FundamentalsIntroduction to Visual Basic 6.0 Fundamentals
Introduction to Visual Basic 6.0 Fundamentals
 
Principles of computer design
Principles of computer designPrinciples of computer design
Principles of computer design
 

Similar a ASCII and Unicode.pptx

Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptAlula Tafere
 
Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabetsRazinaShamim
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)Pramila Selvaraj
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfFashionBoutiquedelhi
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptxRithinA1
 
4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-asciiirdginfo
 
13001620124_AashishAgarwal_Data representation.text and numbers.pdf
13001620124_AashishAgarwal_Data representation.text and numbers.pdf13001620124_AashishAgarwal_Data representation.text and numbers.pdf
13001620124_AashishAgarwal_Data representation.text and numbers.pdfssusercf82c42
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesMilind Patil
 
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVA
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVAJAVA CHARACTER SETS- FUNDAMENTALS OF JAVA
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVAAakriti Bhardwaj
 
Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals SamiHsDU
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)Fizaril Amzari Omar
 
Lecture 2
Lecture 2Lecture 2
Lecture 2Muuluu
 

Similar a ASCII and Unicode.pptx (20)

Storing text
Storing textStoring text
Storing text
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Character sets and alphabets
Character sets and alphabetsCharacter sets and alphabets
Character sets and alphabets
 
Character encoding standard(1)
Character encoding standard(1)Character encoding standard(1)
Character encoding standard(1)
 
Character Sets
Character SetsCharacter Sets
Character Sets
 
The ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdfThe ASCII code used by most computers uses the last seven positions .pdf
The ASCII code used by most computers uses the last seven positions .pdf
 
chapter-2.pptx
chapter-2.pptxchapter-2.pptx
chapter-2.pptx
 
4 character encoding-ascii
4 character encoding-ascii4 character encoding-ascii
4 character encoding-ascii
 
13001620124_AashishAgarwal_Data representation.text and numbers.pdf
13001620124_AashishAgarwal_Data representation.text and numbers.pdf13001620124_AashishAgarwal_Data representation.text and numbers.pdf
13001620124_AashishAgarwal_Data representation.text and numbers.pdf
 
Strings and encodings
Strings and encodingsStrings and encodings
Strings and encodings
 
Adv uni
Adv uniAdv uni
Adv uni
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Lecture 4 system programming-data representation
Lecture 4  system programming-data representationLecture 4  system programming-data representation
Lecture 4 system programming-data representation
 
Ascii codes
Ascii codesAscii codes
Ascii codes
 
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVA
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVAJAVA CHARACTER SETS- FUNDAMENTALS OF JAVA
JAVA CHARACTER SETS- FUNDAMENTALS OF JAVA
 
Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
 
Data Representation
Data RepresentationData Representation
Data Representation
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Topic 2.3 (1)
Topic 2.3 (1)Topic 2.3 (1)
Topic 2.3 (1)
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

ASCII and Unicode.pptx

  • 2.  It is an acronym for the American Standard Code for Information Interchange.  It is a standard seven-bit code that was first proposed by the American National Standards Institute or ANSI in 1963, and finalized in 1968 as ANSI Standard X3.4.  The purpose of ASCII was to provide a standard to code various symbols ( visible and invisible symbols)
  • 3.  In the ASCII character set, each binary value between 0 and 127 represents a specific character.  Most computers extend the ASCII character set to use the full range of 256 characters available in a byte. The upper 128 characters handle special things like accented characters from common foreign languages.  In general, ASCII works by assigning standard numeric values to letters, numbers, punctuation marks and other characters such as control codes.  An uppercase "A," for example, is represented by the decimal number 65."
  • 4.  Bytes can represent any collection of items using a “look-up table” approach  ASCII is used to represent characters  ASCII American Standard Code for Information Interchange
  • 5.
  • 6.  By looking at the ASCII table, you can clearly see a one-to-one correspondence between each character and the ASCII code used.  For example, 32 is the ASCII code for a space.  We could expand these decimal numbers out to binary numbers (so 32 = ), if we wanted to be technically correct -- that is how the computer really deals with things.
  • 7.  Computers store text documents, both on disk and in memory, using these ASCII codes.  For example, if you use Notepad in Windows XP/2000 to create a text file containing the words, "Four score and seven years ago," Notepad would use 1 byte of memory per character (including 1 byte for each space character between the words -- ASCII character 32).  When Notepad stores the sentence in a file on disk, the file will also contain 1 byte per character and per space.  Binary number is usually displayed as Hexadecimal to save display space
  • 8.
  • 9.  ASCII is a character encoding scheme that encodes 128 different characters into 7 bit integers  Computers can only read numbers, so ASCII is a numerical representation of special characters  Ex: ‘%’ ‘!’ ‘?’
  • 10.  Each letter is assigned a number from 0-127  Ex: An uppercase ‘m’ has the ASCII code of 77  By 2007, ASCII was the most commonly used character encoding program on the internet
  • 11.  In C, single characters are represented using the data type char, which is one of the most important scalar data types.  char achar;  achar=‘A’;  achar=65;
  • 12.  A character and an integer (actually a small integer spanning only 8 bits) are actually indistinguishable on their own. If you want to use it as a char, it will be a char, if you want to use it as an integer, it will be an integer, as long as you know how to use proper C++ statements to express your intentions.
  • 13.  ts main objective is to enable a single, unique character set that is capable of supporting all characters from all scripts, as well as symbols, that are commonly utilized for computer processing throughout the globe  Fun fact: Unicode is capable of encoding about at least 1,110,000 characters!
  • 14.  Encode text for creation of passwords  Encode characters used in settings  Modify characters used in documents  Encodes characters to display in all webpages