American National Dictionary for Information Processing

Total Page:16

File Type:pdf, Size:1020Kb

American National Dictionary for Information Processing NAT L INST OF STAND & TECH R.j^C. NIST X3/TR-1—77 PUBLICATIONS -SniDB 517103 1977 SEPTEMBER X3 TECHNICAL REPORT Adopted tor Use by the Federal Government AMERICAN NATIONAL DICTIONARY FOR INFORMATION PROCESSING FIPS 11-1 See Notice on Inside Front Cover M AMERICAN NATIONAL STANDARDS COMMITTEE X3 — COMPUTERS & INFORMATION PROCESSING JKm - ■ PRsA2> tlD II- I iq-n ab( TTTli This DICTIONARY has been adopted for Federal Government use as a basic reference document to promote a common understanding of information processing terminology. Details concerning the specific use of this DICTIONARY are contained in Federal Information Processing Standards Publication 11-1, DICTIONARY FOR INFORMATION PROCESSING For a complete list of publications avail¬ able in the FIPS Series, write to the Office of ADP Standards Management, Institute for Computer Sciences and Technology, National Bureau of Stan¬ dards, Washington, D C 20234 f-^oftH Qvlas vi StzaiiTft DEC 7 1378 X3/TR-1-77 not (\ Cc - ;<£ 1977 September SKI American National Dictionary for Information Processing American National Standards Committee X3 — Computers and Information Processing Secretariat: Computer and Business Equipment Manufacturers Association Published by Computer and Business Equipment Manufacturers Association 1828 L Street NW, Washington DC 20036 202/466-2299 Copyright © 1977 by Computer and Business Equipment Manufacturers Association All rights reserved. Permission is herby granted for quotation, with accreditation to "American National Dictionary for Information Processing, X3/TR-1-77". of up to fifty terms and their definitions. Other than such quotation, no part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior written permission of the publisher. Printed in the United States of America. AMERICAN NATIONAL DICTIONARY FOR INFORMATION PROCESSING 1 Foreword The communication of facts and ideas de¬ The members of Technical Committee pends upon a mutual understanding of who participated in the development of terminology. This is particularly true in this Dictionary were: the rapidly growing field of information processing, in which there is a continuing M. H. Weik, Jr., Chairman need for a comprehensive source of tech¬ J. R. Wood, Vice-Chairman nical terms and definitions. J. L. Walkowicz, Secretary E. A. Anderson By direction of the American National L. A. Difford Standards Committee on Computers and P. M. Gaynor Information Processing (X3) the Technical C. R. Gethmann Committee on Vocabulary (X3K5) pre¬ Dr. S. Gorn pared this American National Dictionary F. T. Grampp for Information Processing (ANDIP). The R. R. Hegland Dictionary is based on the American Na¬ T. D. C. Kuch tional Standard Vocabulary for Informa¬ T. Leach tion Processing, X3.12-1970, published by R. P. Mullinax the American National Standards Institute. A. J. Neumann The Dictionary was developed not only Dr. G. Patterson (Deceased) by combining existing lexicons, but also R. D. Pngge by studying the use of terms throughout H. E. Thiess the field of computers and information C. K. Vanderhoof processing. Technical Committee X3K5, in consultation with other X3 technical Sequence of Entries committees, used proposed and approved The sequence of entries in this Dictionary American national standards and vocabu¬ is determined on a letter-by-letter basis, in laries submitted by other bodies as the other words, only the letters of the alpha¬ sources of terms and definitions. The bet are used to determine the sequence of Dictionary influenced the development of entries. sections of the International Organization for Standardization Vocabulary of Data Processing, prepared by ISO Technical Organization of an Entry Committee 97, Subcommittee 1 (ISO/TC An entry consists of a term or the ab¬ breviation or acronym for a term followed 97/SC 1), and includes terms and defini¬ by a commentary. When a commentary tions from that vocabulary. includes several different definitions for that term, each definition is a separate Advances in the field of information proc¬ item. When an item is used to refer to essing cause changes in terminology. all the terms having the same last word, Suggestions for changes or additions to it lists all of these terms in natural order this document should be addressed to the and precedes this list with the word Computer and Business Equipment “See”. Manufacturers association, 1828 L Street NW, Washington, DC 20036. 2 AMERICAN NATIONAL DICTIONARY FOR INFORMATION PROCESSING Selection of Terms disciplines) A term is a word or group of words to (16) International Definitions be defined. In this Dictionary, the singu¬ (17) USA Definition lar form of the noun and the infinitive (18) References form of the verb are the terms most often selected to be defined. If the term can Each item may include an item number, a be abbreviated, the abbreviation is given source label, a usage label, a descriptive in parentheses immediately following the phrase, an annotation, and a reference to term. other terms, in that order. Organization of a Commentary Item Number A commentary consists of one or more Each item in a commentary is numbered items (definitions or references) arranged consecutively starting with item (1). If in the following order: the commentary consists of only one item, the item number is omitted. Noun Form General Definitions Source Label (1) International Definition This label precedes the definition and (2) USA Definition identifies the source of the definition. (3) References Definitions bearing the source label (ISO) are based on material developed by the Specific Definitions (for special International Organization for Standardiza¬ disciplines) tion. All other definitions are based on (4) International Definition sundry authoritative sources. (5) USA Definition (6) References Usage Label Verb Form (if applicable) This label is a word or phrase that indi¬ General Definitions cates the area or manner of usage of the (7) International Definition (8) USA Definition item. For example, the label “In (9) References programming” indicates an area of usage, and the label “Loosely,” indicates a man¬ Specific Definitions (for special ner of usage. The usage label is followed disciplines) by a comma. (10) International Definition (11) USA Definition Descriptive Phrase (12) References This states, or provides an initial state¬ ment of, the definition of the term and Adjective Form (if applicable) may be assumed to be preceded by the General Definitions phrase, “(the term) is defined as.” The (13) International Definition descriptive phrase completes the initial ( 14) USA Definition sentence. The part of speech of the term (15) References being defined is indicated by the introduc¬ tory words in the descriptive phrase, Specific Definitions (for special where the word “to” indicates a verb. AMERICAN NATIONAL DICTIONARY FOR INFORMATION PROCESSING 3 “pertaining to” indicates a modifier, and as described below. The reference sym¬ other words indicate a noun. bols are described in the order in which they would occur within an entry: Annotation This part of the definition consists of any Deprecated term for. Indicates that the number of complete sentences. These term should not be used (because it is sentences follow the descriptive phrase obsolete, misleading, ambiguous, or and provide additional descriptive or ex¬ jargon) and refers to the preferred term. planatory information. Synonymous with. Identifies terms that References have the same meaning as the defined A reference consists of a symbol or term, and which refer to the defined term phrase to direct the user to another item with a “Synonym for” reference symbol. in the same commentary or to another en¬ try or item in the Dictionary. If the term Synonym for. Refers to a defined term being defined is an acronym or abbrevia¬ that has the same meaning. tion, the complete unabbreviated term is given and the term is defined in a sepa¬ Contrast with. Refers to a term that rate entry (except where the abbreviation has an opposite or substantively different or acronym is predominantly used; e.g., FORTRAN.) An italicized term occurring meaning. in a commentary indicates that the term, or a grammatically different form of it, See. Refers to multiple-word terms that has been defined elsewhere in the Dic¬ have the same last word or words. tionary. Also, the reference symbols (De¬ precated term for. Synonymous with. See also. Refers to related terms that Synonym for. Contrast with. See, and See have a similar, but not synonymous, also) explain the nature of the reference meaning. 4 AMERICAN NATIONAL DICTIONARY FOR INFORMATION PROCESSING A abstract symbol (1) (ISO) A symbol whose meaning and use have not been determined by a general agreement but have to be de¬ fined for each application of the sym¬ absolute address bol. (1) (ISO) An address in a computer lan¬ (2) In optical character recognition, a guage that identifies a storage location symbol whose form does not suggest or a device without the use of any in¬ its meaning and use; these should be termediate reference. defined for each specific set of ap¬ (2) An address that is permanently as¬ plications. signed by the machine designer to a storage location. access (3) Synonymous with explicit address, ma¬ See direct access, direct access storage, im¬ chine address, specific address. mediate access storage, random access, remote access, serial access. absolute addressing (ISO) A method of addressing in which access arm the address part of an instruction contains A part of a disk storage unit that is used an absolute address. to hold one or more reading and writing heads. absolute coding Coding that uses computer instructions access mode with absolute addresses. Synonymous A technique that is used to obtain a with specific coding. specific logical record from, or to place a specific logical record into, a file assigned absolute error to a mass storage device. (1) (ISO) The algebraic result of subtract¬ ing a true, specified, or theoretically access time correct value from the value comput¬ (1) (ISO) The time interval between the ed, observed, measured, or achieved.
Recommended publications
  • Introduction to the Ipaddress Module
    Introduction to the ipaddress Module An Introduction to the ipaddress Module Overview: This document provides an introduction to the ipaddress module used in the Python language for manipulation of IPv4 and IPv6 addresses. At a high level, IPv4 and IPv6 addresses are used for like purposes and functions. However, since there are major differences in the address structure for each protocol, this tutorial has separated into separate sections, one each for IPv4 and IPv6. In today’s Internet, the IPv4 protocol controls the majority of IP processing and will remain so for the near future. The enhancements in scale and functionality that come with IPv6 are necessary for the future of the Internet and adoption is progressing. The adoption rate, however, remains slow to this date. IPv4 and the ipaddress Module: The following is a brief discussion of the engineering of an IPv4 address. Only topics pertinent to the ipaddress module are included. A IPv4 address is composed of 32 bits, organized into four eight bit groupings referred to as “octets”. The word “octet” is used to identify an eight-bit structure in place of the more common term “byte”, but they carry the same definition. The four octets are referred to as octet1, octet2, octet3, and octet4. This is a “dotted decimal” format where each eight-bit octet can have a decimal value based on eight bits from zero to 255. IPv4 example: 192.168.100.10 Every packet in an IPv4 network contains a separate source and destination address. As a unique entity, a IPv4 address should be sufficient to route an IPv4 data packet from the source address of the packet to the destination address of the packet on a IPv4 enabled network, such as the Internet.
    [Show full text]
  • How Many Bits Are in a Byte in Computer Terms
    How Many Bits Are In A Byte In Computer Terms Periosteal and aluminum Dario memorizes her pigeonhole collieshangie count and nagging seductively. measurably.Auriculated and Pyromaniacal ferrous Gunter Jessie addict intersperse her glockenspiels nutritiously. glimpse rough-dries and outreddens Featured or two nibbles, gigabytes and videos, are the terms bits are in many byte computer, browse to gain comfort with a kilobyte est une unité de armazenamento de armazenamento de almacenamiento de dados digitais. Large denominations of computer memory are composed of bits, Terabyte, then a larger amount of nightmare can be accessed using an address of had given size at sensible cost of added complexity to access individual characters. The binary arithmetic with two sets render everything into one digit, in many bits are a byte computer, not used in detail. Supercomputers are its back and are in foreign languages are brainwashed into plain text. Understanding the Difference Between Bits and Bytes Lifewire. RAM, any sixteen distinct values can be represented with a nibble, I already love a Papst fan since my hybrid head amp. So in ham of transmitting or storing bits and bytes it takes times as much. Bytes and bits are the starting point hospital the computer world Find arrogant about the Base-2 and bit bytes the ASCII character set byte prefixes and binary math. Its size can vary depending on spark machine itself the computing language In most contexts a byte is futile to bits or 1 octet In 1956 this leaf was named by. Pages Bytes and Other Units of Measure Robelle. This function is used in conversion forms where we are one series two inputs.
    [Show full text]
  • The Application of File Identification, Validation, and Characterization Tools in Digital Curation
    THE APPLICATION OF FILE IDENTIFICATION, VALIDATION, AND CHARACTERIZATION TOOLS IN DIGITAL CURATION BY KEVIN MICHAEL FORD THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2011 Urbana, Illinois Advisers: Research Assistant Professor Melissa Cragin Assistant Professor Jerome McDonough ABSTRACT File format identification, characterization, and validation are considered essential processes for digital preservation and, by extension, long-term data curation. These actions are performed on data objects by humans or computers, in an attempt to identify the type of a given file, derive characterizing information that is specific to the file, and validate that the given file conforms to its type specification. The present research reviews the literature surrounding these digital preservation activities, including their theoretical basis and the publications that accompanied the formal release of tools and services designed in response to their theoretical foundation. It also reports the results from extensive tests designed to evaluate the coverage of some of the software tools developed to perform file format identification, characterization, and validation actions. Tests of these tools demonstrate that more work is needed – particularly in terms of scalable solutions – to address the expanse of digital data to be preserved and curated. The breadth of file types these tools are anticipated to handle is so great as to call into question whether a scalable solution is feasible, and, more broadly, whether such efforts will offer a meaningful return on investment. Also, these tools, which serve to provide a type of baseline reading of a file in a repository, can be easily tricked.
    [Show full text]
  • 1 Powers of Two
    A. V. GERBESSIOTIS CS332-102 Spring 2020 Jan 24, 2020 Computer Science: Fundamentals Page 1 Handout 3 1 Powers of two Definition 1.1 (Powers of 2). The expression 2n means the multiplication of n twos. Therefore, 22 = 2 · 2 is a 4, 28 = 2 · 2 · 2 · 2 · 2 · 2 · 2 · 2 is 256, and 210 = 1024. Moreover, 21 = 2 and 20 = 1. Several times one might write 2 ∗ ∗n or 2ˆn for 2n (ˆ is the hat/caret symbol usually co-located with the numeric-6 keyboard key). Prefix Name Multiplier d deca 101 = 10 h hecto 102 = 100 3 Power Value k kilo 10 = 1000 6 0 M mega 10 2 1 9 1 G giga 10 2 2 12 4 T tera 10 2 16 P peta 1015 8 2 256 E exa 1018 210 1024 d deci 10−1 216 65536 c centi 10−2 Prefix Name Multiplier 220 1048576 m milli 10−3 Ki kibi or kilobinary 210 − 230 1073741824 m micro 10 6 Mi mebi or megabinary 220 40 n nano 10−9 Gi gibi or gigabinary 230 2 1099511627776 −12 40 250 1125899906842624 p pico 10 Ti tebi or terabinary 2 f femto 10−15 Pi pebi or petabinary 250 Figure 1: Powers of two Figure 2: SI system prefixes Figure 3: SI binary prefixes Definition 1.2 (Properties of powers). • (Multiplication.) 2m · 2n = 2m 2n = 2m+n. (Dot · optional.) • (Division.) 2m=2n = 2m−n. (The symbol = is the slash symbol) • (Exponentiation.) (2m)n = 2m·n. Example 1.1 (Approximations for 210 and 220 and 230).
    [Show full text]
  • Computers and the Thai Language
    [3B2-6] man2009010046.3d 12/2/09 13:47 Page 46 Computers and the Thai Language Hugh Thaweesak Koanantakool National Science and Technology Development Agency Theppitak Karoonboonyanan Thai Linux Working Group Chai Wutiwiwatchai National Electronics and Computer Technology Center This article explains the history of Thai language development for computers, examining such factors as the language, script, and writing system, among others. The article also analyzes characteristics of Thai characters and I/O methods, and addresses key issues involved in Thai text processing. Finally, the article reports on language processing research and provides detailed information on Thai language resources. Thai is the official language of Thailand. Certain vowels, all tone marks, and diacritics The Thai script system has been used are written above and below the main for Thai, Pali, and Sanskrit languages in Bud- character. dhist texts all over the country. Standard Pronunciation of Thai words does not Thai is used in all schools in Thailand, and change with their usage, as each word has a most dialects of Thai use the same script. fixed tone. Changing the tone of a syllable Thai is the language of 65 million people, may lead to a totally different meaning. and has a number of regional dialects, such Thai verbs do not change their forms as as Northeastern Thai (or Isan; 15 million with tense, gender, and singular or plural people), Northern Thai (or Kam Meuang or form,asisthecaseinEuropeanlanguages.In- Lanna; 6 million people), Southern Thai stead, there are other additional words to help (5 million people), Khorat Thai (400,000 with the meaning for tense, gender, and sin- people), and many more variations (http:// gular or plural.
    [Show full text]
  • Tutor Talk Binary Numbers
    What are binary numbers and why do we use them? BINARY NUMBERS Converting decimal numbers to binary numbers The number system we commonly use is decimal numbers, also known as Base 10. Ones, tens, hundreds, and thousands. For example, 4351 represents 4 thousands, 3 hundreds, 5 tens, and 1 ones. Thousands Hundreds Tens ones 4 3 5 1 Thousands Hundreds Tens ones 4 3 5 1 However, a computer does not understand decimal numbers. It only understands “on and off,” “yes and no.” Thousands Hundreds Tens ones 4 3 5 1 In order to convey “yes and no” to a computer, we use the numbers one (“yes” or “on”) and zero (“no” or “off”). To break it down further, the number 4351 represents 1 times 1, 5 times 10, DECIMAL NUMBERS (BASE 10) 3 times 100, and 4 times 1000. Each step to the left is another multiplication of 10. This is why it is called Base 10, or decimal numbers. The prefix dec- 4351 means ten. 4x1000 3x100 5x10 1x1 One is 10 to the zero power. Anything raised to the zero power is one. DECIMAL NUMBERS (BASE 10) Ten is 10 to the first power (or 10). One hundred is 10 to the second power (or 10 times 10). One thousand is 10 to the third 4351 power (or 10 times 10 times 10). 4x1000 3x100 5x10 1x1 103=1000 102=100 101=10 100=1 Binary numbers, or Base 2, use the number 2 instead of the number 10. 103 102 101 100 The prefix bi- means two.
    [Show full text]
  • Lab – Calculating Ipv4 Subnets (Instructor Version) Instructor Note: Red Font Color Or Gray Highlights Indicate Text That Appears in the Instructor Copy Only
    Lab – Calculating IPv4 Subnets (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Determine IPv4 Address Subnetting • Determine the network address. • Determine the broadcast address. • Determine the number of hosts. Part 2: Calculate IPv4 Address Subnetting • Determine the number of subnets created. • Determine number of hosts per subnet. • Determine the subnet address. • Determine the host range for the subnet. • Determine the broadcast address for the subnet. Background / Scenario The ability to work with IPv4 subnets and determine network and host information based on a given IP address and subnet mask is critical to understanding how IPv4 networks operate. The first part is designed to reinforce how to compute network IP address information from a given IP address and subnet mask. When given an IP address and subnet mask, you will be able to determine other information about the subnet such as: • Network address • Broadcast address • Total number of host bits • Number of hosts per subnet In the second part of the lab, for a given IP address and subnet mask, you will determine such information as follows: • Network address of this subnet • Broadcast address of this subnet • Range of host addresses for this subnet • Number of subnets created • Number of hosts for each subnet Instructor Note: This activity can be done in class or assigned as homework. If the assignment is done in class, you may wish to have students work alone or in teams of 2 students each. It is suggested that the first problem is done together in class to give students guidance as to how to proceed for the rest of the assignment.
    [Show full text]
  • Principles of Computer Architecture
    PRINCIPLES OF COMPUTER ARCHITECTURE CLASS TEST EDITION – AUGUST 1999 Miles J. Murdocca Department of Computer Science Rutgers University New Brunswick, NJ 08903 (USA) [email protected] http://www.cs.rutgers.edu/~murdocca/ Vincent P. Heuring Department of Electrical and Computer Engineering University of Colorado Boulder, CO 80309-0425 (USA) [email protected] http://ece-www.colorado.edu/faculty/heuring.html Copyright © 1999 Prentice Hall For Ellen, Alexandra, and Nicole and For Gretchen PREFACE iii PREFACE About the Book Our goal in writing this book is to expose the inner workings of the modern digital computer at a level that demystifies what goes on inside the machine. The only prerequisite to Principles of Computer Architecture is a working knowledge of a high-level programming language. The breadth of material has been chosen to cover topics normally found in a first course in computer architecture or computer organization. The breadth and depth of coverage have been steered to also place the beginning student on a solid track for con- tinuing studies in computer related disciplines. In creating a computer architecture textbook, the technical issues fall into place fairly naturally, and it is the organizational issues that bring important features to fruition. Some of the features that received the greatest attention in Principles of Computer Architecture include the choice of the instruction set architecture (ISA), the use of case studies, and a voluminous use of examples and exercises. THE INSTRUCTIONAL ISA A textbook that covers assembly language programming needs to deal with the issue of which instruction set architecture (ISA) to use: a model architecture, or one of the many commercial architectures.
    [Show full text]
  • Computer Network
    Computer Network Unit 1 Q 1. What are the topologies in computer n/w ? Ans: Network topologies are categorized into the following basic types: bus ring star tree mesh Bus Topology Bus networks use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and can take down the entire network. Star Topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch orrouter. Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. Q 2. What is Computer n/w ? Ans: A computer network is a group of two or more computers connected to each electronically. This means that the computers can "talk" to each other and that every computer in the network can send information to the others. Q 3. How we arrived 7 layers of OSI reference model? Why not less than 7 or more than 7 ? Ans: The ISO looked to create a simple model for networking.
    [Show full text]
  • A Hextet Refers to a Segment Of
    A Hextet Refers To A Segment Of Which Hansel panders so methodologically that Rafe dirk her sedulousness? When Bradford succumbs his tastiness retool not bearishly enough, is Zak royalist? Hansel recant painstakingly if subsacral Zak cream or vouch. A hardware is referred to alternate a quartet or hextet each query four hexadecimal. Araqchi all disputable issues between Iran and Sextet ready World. What aisle the parts of an IPv4 address A Host a Network 2. Quantitative Structure-Property Relationships for the. The cleavage structure with orange points of this command interpreter to qsprs available online library of a client program output from another goal of aesthetics from an old pitch relationships between padlock and? The sextet V George Barris SnakePit dragster is under for sale. The first recording of Ho Bynum's new sextet with guitarist Mary Halvorson. Unfiltered The Tyshawn Sorey Sextet at the Jazz Gallery. 10 things you or know about IPv6 addressing. In resonance theory the resonant sextet number hH k of a benzenoid. Sibelius 7 Reference Guide. The six-part romp leans hard into caricatures to sing of mortality and life's. A percussion instrument fashioned out of short segments of hardwood and used in. Arrangements as defined by the UIL State Direc- tor of Music. A new invariant on hyperbolic Dehn surgery space 1 arXiv. I adore to suggest at least some attention the reasons why the sextet is structured as it. Cosmic Challenge Seyferts Sextet July 2020 Phil Harrington This months. Download PDF ScienceDirect. 40 and 9 are octets and 409 is a hextet since sleep number declare the octet.
    [Show full text]
  • Representing Information in English Until 1598
    In the twenty-first century, digital computers are everywhere. You al- most certainly have one with you now, although you may call it a “phone.” You are more likely to be reading this book on a digital device than on paper. We do so many things with our digital devices that we may forget the original purpose: computation. When Dr. Howard Figure 1-1 Aiken was in charge of the huge, Howard Aiken, center, and Grace Murray Hopper, mechanical Harvard Mark I calcu- on Aiken’s left, with other members of the Bureau of Ordnance Computation Project, in front of the lator during World War II, he Harvard Mark I computer at Harvard University, wasn’t happy unless the machine 1944. was “making numbers,” that is, U.S. Department of Defense completing the numerical calculations needed for the war effort. We still use computers for purely computational tasks, to make numbers. It may be less ob- vious, but the other things for which we use computers today are, underneath, also computational tasks. To make that phone call, your phone, really a com- puter, converts an electrical signal that’s an analog of your voice to numbers, encodes and compresses them, and passes them onward to a cellular radio which it itself is controlled by numbers. Numbers are fundamental to our digital devices, and so to understand those digital devices, we have to understand the numbers that flow through them. 1.1 Numbers as Abstractions It is easy to suppose that as soon as humans began to accumulate possessions, they wanted to count them and make a record of the count.
    [Show full text]
  • Technical Study Universal Multiple-Octet Coded Character Set Coexistence & Migration
    Technical Study Universal Multiple-Octet Coded Character Set Coexistence & Migration NIC CH A E L T S T U D Y [This page intentionally left blank] X/Open Technical Study Universal Multiple-Octet Coded Character Set Coexistence and Migration X/Open Company Ltd. February 1994, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. X/Open Technical Study Universal Multiple-Octet Coded Character Set Coexistence and Migration ISBN: 1-85912-031-8 X/Open Document Number: E401 Published by X/Open Company Ltd., U.K. Any comments relating to the material contained in this document may be submitted to X/Open at: X/Open Company Limited Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii X/Open Technical Study (1994) Contents Chapter 1 Introduction............................................................................................... 1 1.1 Background.................................................................................................. 2 1.2 Terminology................................................................................................. 2 Chapter 2 Overview..................................................................................................... 3 2.1 Codesets.......................................................................................................
    [Show full text]