Explain about of unicode, Computer Engineering

Assignment Help:

Q. Explain about of Unicode?

This is a newer International standard for character representation. Unicode offers a unique code for each character irrespective of Program, platform and Language. Unicode Standard has been accepted by Industry. The key players which have adopted Unicode involve Apple, HP, IBM, Microsoft, Oracle, SAP, Sun, Sybase, Unisys and many other companies. Unicode has been used in most of latest client server software. Unicode is needed by modern standards such as XML, Java, JavaScript, and CORBA 3.0. It is supported in various operating systems and almost all modern web browsers. Unicode comprises character set of Dev Nagari. The emergence of Unicode Standard and availability of tools supporting it is among most important recent global software technology trends.

One of the main benefits of Unicode in client-server or multi-tiered applications as well as websites is cost saving over use of legacy character sets which results in targeting website and software products across multiple languages, platforms and countries without the need of re-engineering. So it helps in data transfer by a number of different systems without any compatibility problems. In India suitability of Unicode to implement Indian languages is still being worked out.


Related Discussions:- Explain about of unicode

Which device consume minimum power, Which device consume minimum power ? ...

Which device consume minimum power ? Ans. Minimum power consume by CMOS as in its one p-MOS and one n-MOS transistors are connected in complimentary mode, so one device is ON a

Dfa, design a dfa which accept all the string over a and b ending with ab o...

design a dfa which accept all the string over a and b ending with ab or ba

Analysis of amdahls law, Q. Analysis of Amdahls law? The conclusions of...

Q. Analysis of Amdahls law? The conclusions of analysis of Amdahl's law are: 1) To optimize performance of parallel computers modified compilers should be developed that sho

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

How many and gates are required to realize Y = CD+EF+G, How many AND gates ...

How many AND gates are required to realize Y = CD+EF+G ? Ans. Y = CD + EF + G for realize this two AND gates are needed (for CD and EF).

#project, how to build PVR set-top box using raspberry

how to build PVR set-top box using raspberry

Pipeline architecture, Explain detailed classification of pipelined process...

Explain detailed classification of pipelined processor.

How is it possible to make a module counter using n flipflop, How is it pos...

How is it possible to make a module 2 n counter using N-flipflops?  Name the two types of such counters. Ans: Module 2 n counter counts total 2 n distinguishable states w

Final implementation of object oriented modelling, Final Implementation of ...

Final Implementation of Object oriented modelling Final Implementation: At this phase, the final execution of classes and  relationships developed while object design takes

Describe the errors, Q. Describe the Errors? Errors  Two probable...

Q. Describe the Errors? Errors  Two probabletypes of errors may take place in assembly programs:   a. Programming errors: They are familiar errors you may encounter in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd