SlideShare uma empresa Scribd logo
1 de 2
Difference between ASCII and EBDIC<br />ASCII:<br /> American standard Code for Information Interchange<br />PURPOSE: <br />To be widely used in small peripherals, computer instruments, and various communicating devices.<br />It is a character encoding standard.<br />TYPES:<br />,[object Object]
ASCII-8ASCII-7: 7 bit code that can represent 128(27) different characters.<br />,[object Object],        ASCII – 8: extended version of ASCII-7<br />,[object Object]

Mais conteúdo relacionado

Mais procurados

Electric power substation
Electric power substationElectric power substation
Electric power substation
qwerty25ty
 
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
Gianfranco Tammaro
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
BalaMurugan992669
 
The univentricular repair indications, procedures, outcomes and controversies
The univentricular repair indications, procedures, outcomes and controversiesThe univentricular repair indications, procedures, outcomes and controversies
The univentricular repair indications, procedures, outcomes and controversies
Joel Regondola
 

Mais procurados (20)

Electric power substation
Electric power substationElectric power substation
Electric power substation
 
Le nuove linee guida esc per l'embolia polmonare
Le nuove linee guida esc per l'embolia polmonareLe nuove linee guida esc per l'embolia polmonare
Le nuove linee guida esc per l'embolia polmonare
 
Echo assesmentof rv function
Echo assesmentof rv functionEcho assesmentof rv function
Echo assesmentof rv function
 
Ventricular tachycardia
Ventricular tachycardiaVentricular tachycardia
Ventricular tachycardia
 
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
Menghini F. - Piccioni F. I quadri clinici della Fibrillazione Atriale: dallo...
 
Data Communication Unit 1
Data Communication Unit 1Data Communication Unit 1
Data Communication Unit 1
 
09 Arithmetic
09  Arithmetic09  Arithmetic
09 Arithmetic
 
Second Step of Coronary Angiography
Second Step of Coronary AngiographySecond Step of Coronary Angiography
Second Step of Coronary Angiography
 
Dc Distributed Load
Dc Distributed LoadDc Distributed Load
Dc Distributed Load
 
Papillary muscle-vt
Papillary muscle-vtPapillary muscle-vt
Papillary muscle-vt
 
Anshuman Tech Private Limited, Pune, Training Equipment
Anshuman Tech Private Limited, Pune, Training EquipmentAnshuman Tech Private Limited, Pune, Training Equipment
Anshuman Tech Private Limited, Pune, Training Equipment
 
Linee guida e timing chirurgico insufficienza aortica
Linee guida e timing chirurgico insufficienza aorticaLinee guida e timing chirurgico insufficienza aortica
Linee guida e timing chirurgico insufficienza aortica
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
 
The univentricular repair indications, procedures, outcomes and controversies
The univentricular repair indications, procedures, outcomes and controversiesThe univentricular repair indications, procedures, outcomes and controversies
The univentricular repair indications, procedures, outcomes and controversies
 
Idiopathic Ventricular Tachycardia (VT)
Idiopathic Ventricular Tachycardia (VT)Idiopathic Ventricular Tachycardia (VT)
Idiopathic Ventricular Tachycardia (VT)
 
Congenital anomalies of IVC
Congenital anomalies of IVCCongenital anomalies of IVC
Congenital anomalies of IVC
 
State of the art mitral valve repair
State of the art mitral valve repairState of the art mitral valve repair
State of the art mitral valve repair
 
Chapter 7: Operational Amplifier (Op-Amp)
Chapter 7: Operational Amplifier (Op-Amp)Chapter 7: Operational Amplifier (Op-Amp)
Chapter 7: Operational Amplifier (Op-Amp)
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codes
 
Semiconductor diodes1
Semiconductor diodes1Semiconductor diodes1
Semiconductor diodes1
 

Semelhante a Difference between ascii and ebdic

Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
Tech_MX
 

Semelhante a Difference between ascii and ebdic (20)

Catalog màn hình cảm ứng HMI V8 Fuji Electric
Catalog màn hình cảm ứng HMI V8 Fuji ElectricCatalog màn hình cảm ứng HMI V8 Fuji Electric
Catalog màn hình cảm ứng HMI V8 Fuji Electric
 
INTERACTIVE KIOSK SOLUTION FOR SELF-SERVICE
INTERACTIVE KIOSK SOLUTION FOR SELF-SERVICEINTERACTIVE KIOSK SOLUTION FOR SELF-SERVICE
INTERACTIVE KIOSK SOLUTION FOR SELF-SERVICE
 
Raspberry pi technical documentation
Raspberry pi technical documentationRaspberry pi technical documentation
Raspberry pi technical documentation
 
Access Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in BangladeshAccess Control Device-CCTV Camera in Bangladesh
Access Control Device-CCTV Camera in Bangladesh
 
Access Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBDAccess Control System in Bangladesh-OptimationBD
Access Control System in Bangladesh-OptimationBD
 
Access Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV BangladeshAccess Control Device in Bangladesh-CCTV Bangladesh
Access Control Device in Bangladesh-CCTV Bangladesh
 
Vxl Thin Client presentation
Vxl Thin Client presentation Vxl Thin Client presentation
Vxl Thin Client presentation
 
Elm wifi
Elm wifiElm wifi
Elm wifi
 
NEC X841 uhd
NEC X841 uhdNEC X841 uhd
NEC X841 uhd
 
Devkit8000 OMAP3530 Evaluation Kit
Devkit8000 OMAP3530 Evaluation KitDevkit8000 OMAP3530 Evaluation Kit
Devkit8000 OMAP3530 Evaluation Kit
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Embest catalog 2011
Embest catalog 2011Embest catalog 2011
Embest catalog 2011
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Exor e top507_specsheet
Exor e top507_specsheetExor e top507_specsheet
Exor e top507_specsheet
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
 
Ip sip video doorphone intercom system
Ip sip video doorphone intercom systemIp sip video doorphone intercom system
Ip sip video doorphone intercom system
 
Open-E DSS V7 Active-Passive iSCSI Failover on Intel Server Systems
Open-E DSS V7 Active-Passive iSCSI Failover on Intel Server SystemsOpen-E DSS V7 Active-Passive iSCSI Failover on Intel Server Systems
Open-E DSS V7 Active-Passive iSCSI Failover on Intel Server Systems
 
ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7
 
Introduction to-microprocessors
Introduction to-microprocessorsIntroduction to-microprocessors
Introduction to-microprocessors
 
Mitsubishi graphic operation terminal got2000 series
Mitsubishi graphic operation terminal got2000 seriesMitsubishi graphic operation terminal got2000 series
Mitsubishi graphic operation terminal got2000 series
 

Mais de Devika Rangnekar (13)

Case study
Case studyCase study
Case study
 
Business plan
Business planBusiness plan
Business plan
 
Project Report on Marketing Information System
Project Report on Marketing Information SystemProject Report on Marketing Information System
Project Report on Marketing Information System
 
Final mkis
Final mkisFinal mkis
Final mkis
 
Working of input and output devices
Working of input and output devicesWorking of input and output devices
Working of input and output devices
 
Operating system
Operating systemOperating system
Operating system
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
working of Projector
working of Projectorworking of Projector
working of Projector
 
Difference between internet and www
Difference between internet and wwwDifference between internet and www
Difference between internet and www
 
Assembly Language -I
Assembly Language -IAssembly Language -I
Assembly Language -I
 
Raster Scan And Random Scan
Raster Scan And Random ScanRaster Scan And Random Scan
Raster Scan And Random Scan
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Último (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Difference between ascii and ebdic

  • 1.
  • 2.
  • 3. Additional bit is added to left of 7th bit of ASCII-7 codes. EXAMPLE: <br />GIRL n binary no : 1000111 1001001 1010010 1001100<br /> G I R L<br />EBDIC :<br /> Extended Binary Coded Decimal Interchange Code<br />PURPOSE: <br />Standard 8 bit code used for large computers<br />CHARACTER ZONE DIGIT<br />A 11000001<br />B11000010<br />C 11000011<br />D11000100<br />E11000101<br />F11000110<br />G11000111<br />H 11001000<br />I 11001001<br />EXAMPLE: <br />BID in BINARY<br />1100001011001001 11000100<br /> B I D<br />