1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
12

Why was unicode invented

Computers and Technology
2 answers:
AfilCa [17]3 years ago
6 0
Unicode is a character encoding standard that has widespread acceptance. Microsoft software uses Unicode at its core. Whether you realize it or not, you are using Unicode already! Basically, “computers just deal with numbers. They store letters and other characters by assigning a number for each one. Before Unicode was invented, there were hundreds of different encoding systems for assigning these numbers. No single encoding could contain enough characters.1<span>” This has been the problem we, in SIL, have often run into. If you are using a legacy encoding your font conflicts with the font someone in another area of the world uses. You might have an </span><span> in your font while someplace else someone used a </span><span> at the same codepoint. Your files are incompatible. Unicode provides a unique number for every character and so you do not have this problem if you use Unicode. If your document calls for </span>U+0289 <span> it will be clear to any computer program what the character should be thats why</span>
GrogVix [38]3 years ago
5 0
The old system, ASII, was no where near large enough to deal with all the different languages & symbols that exist  
You might be interested in
The numbers on the bottom of a typical check represent all of the following EXCEPT?
vfiekz [6]
The amount of money in your account
8 0
3 years ago
Read 2 more answers
Key Categories: more libraries and thousands of functions
Vadim26 [7]

Answer:

2b2t

Explanation:

2b2t

6 0
3 years ago
After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
pashok25 [27]

Answer:

configuring the software

Explanation:

Alexandre is said to have installed a new software to her computer and then proceeds to set it up to perform in a certain way. What she did was to configure the software.

Configuring software in a computer has to do with setting it up to behave in certain ways according to the user.

3 0
3 years ago
Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
Lesechka [4]
The answer to this question is Registration
Registration on the network interface will allow computer users all around the world to access a certain information stored within a certain address in that network which most people know as a website.
Today, to do a network registration, people just need to contact a hosting service that will take care of everything for us, and we just need to provide the content.


6 0
3 years ago
What is the difference between amplifier and the repeater?
mixas84 [53]

Explanation:

Repeater:

  • It is used for the regeneration and transmission in case the previously transmitted signal is weak .
  • It takes higher input power , to provide lower output power .
  • It uses a static environment .
  • It is used for the reduction or elimination of noise .
  • It works on the the physical layer of OSI model.

Amplifier:

  • It is basically used to increase the amplitude or the strength of the signal .
  • It takes lower input power , to provide higher output power .
  • It uses in a mobile and remote network .
  • It  increases the amplitude of the signal of noise .
  • It works in wireless communication .

8 0
3 years ago
Other questions:
  • Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrato
    10·1 answer
  • Recursion is memory-intensive because ________. Select one: a. it requires large data values b. it must occur numerous times bef
    11·1 answer
  • What is malware short for?
    13·2 answers
  • What can you search on Microsoft Word or Powerpoint Clipart or Google (Clip art) to find more pictures like the ones below but w
    7·1 answer
  • If you are asked to list your favorite websites in no particular order, you are relying on
    8·1 answer
  • Original list:0,0,0,0,0,0,0,0
    10·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • What alternative to leased lines is used by VPNs? As an alternative to leased lines, VPNs use ______ connections.
    11·1 answer
  • Sort the layout options for two types of masters in PowerPoint.
    5·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!