Explain extended binary coded decimal interchange code, Computer Engineering

Assignment Help:

Q. Explain Extended Binary Coded Decimal Interchange Code?

Extended Binary Coded Decimal Interchange Code (EBCDIC) is a character-encoding format employed by IBM mainframes. It is an 8-bit code and is NOT Compatible to ASCII. It had been designed mainly for ease of use of punched cards. This was mainly used on IBM mainframes and midrange systems like AS/400. Strength of EBCDIC was availability of wider range of control characters for ASCII. Character coding in this set is based on binary coded decimal which is, the contiguous characters in alphanumeric range are represented in blocks of 10 starting from 0000 binary to 1001 binary. Other characters fill in rest of range. There are 4 major blocks in EBCDIC code:

1708_Explain Extended Binary Coded Decimal Interchange Code.png

There are various different variants of EBCDIC. Most of these vary in punctuation coding.  More details on EBCDIC codes can be attained from further reading and web pages on EBCDIC.


Related Discussions:- Explain extended binary coded decimal interchange code

What are the steps in a bdc session, What are the steps in a BDC session? ...

What are the steps in a BDC session? The first step in a BDC session is to recognize the screens of the transaction that the program will process.  Next step is to write a pro

Delete the leaves of a binary tree, Write a recursive algorithm to delete t...

Write a recursive algorithm to delete the leaves of a binary tree. Programming Requirements You must use the binary search tree code provided.  Each algorithm must be impleme

Constraint satisfaction problems, Constraint Satisfaction Problems: Fu...

Constraint Satisfaction Problems: Furthermore I was perhaps most proud of AI on a Sunday. However this particular Sunday, a friend of mine found an article in the Observer reg

What is reduction, What is reduction?  A reduction is a way of changing...

What is reduction?  A reduction is a way of changing one problem into another in such a way that a solution to the second problem can be used to explain the first problem.

Explain the page stealer and the fault handler, How the Kernel handles both...

How the Kernel handles both the page stealer and the fault handler? The page stealer and the fault handler thrash because of the shortage of the memory. If the sum of the worki

What is managed bean or mbean, A managed bean - sometimes simply referred t...

A managed bean - sometimes simply referred to as an MBean - is a type of JavaBean, developed with dependency injection. Managed Beans are particularly used in the Java Management E

What are the various layers of a file system, What are the various layers o...

What are the various layers of a file system? The file system is composed of lots of dissimilar levels. Each level in the design uses the characteristic of the lower levels to

Algorithmic complexity theory, Algorithmic Complexity theory: Moreover...

Algorithmic Complexity theory: Moreover a similar situation occurs in broad to specific ILP systems when the inference rules are deductive thus they specialize. So at some sta

Compare putchar function with the getchar function, Normal 0 fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

How many voice channel have a master group, A Master group consists of? ...

A Master group consists of? A master group have 300 voice channels.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd