ASCII
American Standard Code for Information Interchange

ASCII

ASCII abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Because of technical limitations of computer systems at the time it was invented, ASCII has just 128 code points, of which only 95 are printable characters, which severely limited its scope. Many computer systems instead use Unicode, which has millions of code points, but the first 128 of these are the same as the ASCII set.

Extensions :

  • Unicode
  • ISO/ICE 8859 (series)
  • KOI - 8
  • OEM (series)
  • Windows - 125x (series)

The Internet Assigned Numbers Authority (IANA) prefers the name US-ASCII for this character encoding. ASCII is one of the IEEE milestones.

Work on the ASCII standard began in May 1961, with the first meeting of the American Standards Association's (ASA) (now the American National Standards Institute or ANSI) X3.2 subcommittee. The first edition of the standard was published in 1963 underwent a major revision during 1967, and experienced its most recent update during 1986.The use of ASCII format for Network Interchange was described in 1969.That document was formally elevated to an Internet Standard in 2015.Ninety-five of the encoded characters are printable: these include the digits 0 to 9, lowercase letters a to z, uppercase letters A to Z, and punctuation symbols. In addition, the original ASCII specification included 33 non-printing control codes.

Example :

lowercase 'i' would be represented in the ASCII encoding by binary 1101001 = hexadecimal 69 (i is the ninth letter) = decimal 105.


Antony Sylvester J

"Affiliate Marketing Expert | Driving Sales with Amazon, JVZoo & Digistore24"

1 年

Well said

要查看或添加评论,请登录

MEGAVARSHINI A的更多文章

  • ?? My Dream Company: Cisco – A Journey Towards Cybersecurity Excellence

    ?? My Dream Company: Cisco – A Journey Towards Cybersecurity Excellence

    ?? Why Cisco? Cisco stands out for its cutting-edge innovations in cybersecurity, networking, and cloud security. Its…

    5 条评论
  • Peer - to - Peer Communication

    Peer - to - Peer Communication

    Peer-to-peer (P2P) communication is a decentralized form of data exchange where each participant (peer) acts as both a…

  • OSI Layers

    OSI Layers

    The open systems interconnection (OSI) model is a conceptual model created by the International Organization for…

  • Snort

    Snort

    Snort is referred to as a packet sniffer that monitors network traffic, scrutinizing each packet closely to detect a…

    2 条评论
  • NetStumbler

    NetStumbler

    NetStumbler (also known as Network Stumbler) was a tool for Windows that facilitates detection of Wireless LANs using…

  • Firewall

    Firewall

    A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an…

    2 条评论
  • Nmap

    Nmap

    Nmap is short for Network Mapper. It is an open-source Linux command-line tool that is used to scan IP addresses and…

  • Cyber Attack

    Cyber Attack

    A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple…

    1 条评论
  • Wireless hacking

    Wireless hacking

    A wireless network is a set of two or more devices connected with each other via radio waves within a limited space…

  • Ransomware

    Ransomware

    Ransomware is a type of malware that locks and encrypts a victim's data, files, devices or systems, rendering them…

社区洞察

其他会员也浏览了