answersLogoWhite

0

I think that the code that computers use to interchange information is called the ASCII code.

User Avatar

Wiki User

16y ago

What else can I help you with?

Continue Learning about Computer Science

What is full form of ebcdic?

Extended binary coded decimal interchange code


What are example of malicious code?

Malicious code is any code designed to have an effect that is unintended by the receiver. Viruses, Spyware and Malware are three examples. Virus: Any code designed with the intent to damage files or disrupt hardware on a computer and to pass itself to other computers with the same intent. Spyware: Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you. Malware: Code designed to steal personal information such as usernames, passwords, bank account info, credit card numbers and report that information to people who may use your financial information to steal from you. Other types may be called trojans, backdoors, worms, spyware, adware, or bloatware.


How do Morse code and binary code compare and contrast in terms of their methods of encoding and decoding information?

Morse code and binary code both encode and decode information, but they use different methods. Morse code uses combinations of dots and dashes to represent letters and numbers, while binary code uses combinations of 0s and 1s. Morse code relies on sound or light signals, while binary code is used in computers to represent data. Both codes require a key or chart to decode the information.


What is the relationship between binary code and Morse code?

Binary code and Morse code are both systems used to represent information through a series of symbols. Binary code uses combinations of 0s and 1s to represent letters, numbers, and other characters in computers, while Morse code uses combinations of dots and dashes to represent the same information in telecommunication. Both codes serve as a way to encode and decode information, but they use different symbols and methods to do so.


What international set of standards allows a level of standardization for Information Technology?

The Common Criteria for Information Technology Security Evaluation is the name of the international set of standard that were developed to allow for a level of standardization for information security. All IT security products used by the U.S government is required to have Common Criteria certification.

Related Questions

What is the acronym for the standard code for computers and information interchange?

ASCII


What is character code used by most personal computers?

ASCII (American Standard Code for Information Interchange)


How does the ASCII code works?

ASCII is an abbreviation for American Standard Code for Information Interchange. The ASCII code, which is used worldwide, is used to create computer coding languages so computers can interact with people.


What code system is used in computers for the standard character set?

The system is called the American Standard Code for Information Interchange and is abbreviated ASCII. There are different versions to accommodate a number of world languages.


The computer code for interchange of information between terminals is?

ANCII code


What is the expansion for ascii code?

American Standard Code for Information Interchange


What is the abbreviation for the American Standard Code for information Interchange?

ascii


What code represents a digit or letter or special character in computers?

In computers, characters, including digits, letters, and special symbols, are represented using character encoding systems like ASCII (American Standard Code for Information Interchange) or Unicode. Each character is assigned a unique numerical code, which allows computers to interpret and display them. For example, in ASCII, the letter 'A' is represented by the code 65, while the digit '0' is represented by the code 48. Unicode extends this system to accommodate characters from multiple languages and symbols, providing a broader range of codes.


What code represents computer characters?

American Standard Code for Information Interchange (ASCII )


How many characters can be encoded into ASCII?

ASCII stands for American Standard Code for Information Interchange. It provides a means to facilitate communication on computers. It has 128 characters.


How does a computers process binary digits into keyboard characters?

Chracters are represented using binary digit combinations. For example the ASCII American Standard Code for Information Interchange is one such encoding.


What is a EBCDIC?

EBCDIC code stands for extended binary coded decimal interchange code....it is an 8 bit code and can provide 256 different characters..it is used on ibm mainframes and on other large computers.. EBCDIC code stands for extended binary coded decimal interchange code....it is an 8 bit code and can provide 256 different characters..it is used on ibm mainframes and on other large computers..

Trending Questions
How does constant propagation impact the efficiency of a program? How do get a bioship in flashtrek broken mirror? How does the reduction from 3-CNF-SAT to Subset-Sum work? What distance between modem and computer is best? How does a story about the changes in technology her grandmother has experienced in the last fifty years fit into Ellen's speech on new technology? Advantages of two phase locking protocol? If one of the links to a computer on a physical star topology is severed what will be the result? Who can tell me how I can use DVDPe Pro for Auto crop? How does the function t(n) relate to the function t(n1/2) 1? What are the disadvantages of using CAM? What does the picture of a lock mean on matchcom? When was Software Creations - UK - created? What is the minimum number of domain controllers you should configure to ensure that a domain is fault tolerant? What is the term for the technology that allows users to view message details such as the length of calls for example? How much is Mileyworld? Software that creates packets for moving data across networks? It is being said that in token passing access control the main advantage of such networks is that are deterministic. Disscuss the truth of the said statement? What type of end-user connectivity requires that an ISP have a DSLAM device in their network? What risk is any event or action that could cause a loss of or damage to computer hardware software data information or processing capability? What is passware?