Explain extended binary coded decimal interchange code, Computer Engineering

Assignment Help:

Q. Explain Extended Binary Coded Decimal Interchange Code?

Extended Binary Coded Decimal Interchange Code (EBCDIC) is a character-encoding format employed by IBM mainframes. It is an 8-bit code and is NOT Compatible to ASCII. It had been designed mainly for ease of use of punched cards. This was mainly used on IBM mainframes and midrange systems like AS/400. Strength of EBCDIC was availability of wider range of control characters for ASCII. Character coding in this set is based on binary coded decimal which is, the contiguous characters in alphanumeric range are represented in blocks of 10 starting from 0000 binary to 1001 binary. Other characters fill in rest of range. There are 4 major blocks in EBCDIC code:

1708_Explain Extended Binary Coded Decimal Interchange Code.png

There are various different variants of EBCDIC. Most of these vary in punctuation coding.  More details on EBCDIC codes can be attained from further reading and web pages on EBCDIC.


Related Discussions:- Explain extended binary coded decimal interchange code

State the datatypes of verilog, State the datatypes of Verilog Verilog....

State the datatypes of Verilog Verilog. Compared to VHDL, Verilog data types are very simple, easy to use and very much geared towards modeling hardware structure as opposed to

Cache simulater, Requirements You are required to program (in a high l...

Requirements You are required to program (in a high level language such as C, C++, Java) and implement a cache simulator which will have the following inputs and outputs:-

Should we use cgi or an api, APIs are proprietary programming interfaces su...

APIs are proprietary programming interfaces supported by certain platforms. By using an API, you lose all portability. If you know your application will only ever run on single pla

What is the main reason to encrypt a file, The main reason to encrypt a fil...

The main reason to encrypt a file is to ? Ans. The main purpose to encrypt a file is to secure that for transmission.

Define syntax of mpi_scatter function, Q. Define syntax of MPI_Scatter func...

Q. Define syntax of MPI_Scatter function? MPI_Scatter(Sendaddr, Scount, Sdatatype, Receiveaddr, Rcount, Rdatatype, Rank, Comm): 'Using this function process with rank' ran

Differentiate b/w program translation and interpretation, Differentiate bet...

Differentiate between program translation and program interpretation. The program translation model makes the execution gap through translating a program written in a program

Instruction cycle-flynn’s classification, Instruction Cycle The instruc...

Instruction Cycle The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is descri

Describe the various characteristics of udp protocol, Describe the various ...

Describe the various characteristics of UDP protocol. The characteristics of the UDP are as follows: End to end: UDP is transport protocols that can distinguish between

Give brief summary of common aspects found in spreadsheets, Give brief summ...

Give brief summary of common aspects found in spreadsheets -  It's made up of columns and rows; every row is identified by a number and every column is identified with a letter

C LANGUAGE PROGRAMME, find a c program to find the area under the curve y=f...

find a c program to find the area under the curve y=f(x) between x=a and x=b,intregrate y=f(x)between the limits of a and b.the area under a curve between two points can be found b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd