] |+---------------------+1row in Set (0.00 sec)Mysql>show databases;+--------------------+| Database |+--------------------+| information_schema|| HK ||test |+--------------------+3rows in Set (0.00 sec)Mysql>use HK;Readingtable information for completion of table and column namesYoucan turn off this feature to get a quicker startup with-aDatabasechangedMysql>use HK;DatabasechangedMysql>show tables;+--------------+| TABLES_IN_HK |+--------------+|city |+--------------+1row in Set (0.00 sec)Mysq
. It is only pointed out that although multiple bytes are used to represent a symbol, the Chinese character encoding of the GB class has nothing to do with the Unicode and UTF-8 of the subsequent text.
3. Unicode
Unicode character set (UCS), the International Standards Organization established the ISO/IEC JTC1/SC2/WG2 Working Group in April 1984 to uniformly encode texts and symbols of various countries. In 1991, a multinational company set up Unic
I have never figured out what the Unicode Character Set and uft-8 encoding are like in The ascall character set.
Article I understand a little bit.
Unicode
(Computer) The most common standard character set after ASCII. ASCII is still the foundation of computer operation. However, there are too few. It cannot keep pace with the development of computer applications. Unicode is more powerful. The first 255 Unicode characters can be mapped to the ASCII two table.
In April 1984, ISO/IEC JTC1/SC2/
256 types of symbols. It must be expressed by multiple bytes. For example, the common encoding method for simplified Chinese is gb2312, which uses two bytes to represent a Chinese character. Therefore, it can theoretically represent a maximum of 256x256 = 65536 characters.
The issue of Chinese encoding needs to be discussed in a specific article. This note does not cover this issue. It is only pointed out that although multiple bytes are used to represent a symbol, the Chinese character encodi
character.
ASCII code for English0-127 is sufficient for all characters in the Code. For Chinese characters, two bytes (bytes) must be used to represent one character. The first byte must be greater than (so we haveProgramThe criterion for determining the Chinese text is that the ASCII code is greater than 127 ). The preceding two bytes are used to represent a Chinese character. In practice, they are called dual-byte (that is, DBCS:Double-byte character set). In contrast, an English character
characters are used. A single byte can only represent 256 types of symbols. It must be expressed by multiple bytes. For example, the common encoding method for simplified Chinese is gb2312, which uses two bytes to represent a Chinese character. Therefore, it can theoretically represent a maximum of 256x256 = 65536 characters.
The issue of Chinese encoding needs to be discussed in a specific article. This note does not cover this issue. It is only pointed out that although multiple bytes are u
-255 of this paragraph.As for Asian countries, the use of symbols is more, the Chinese character is about 100,000. A byte can represent only 256 symbols, which is certainly not enough, and must be expressed using multiple bytes to express a symbol. For example, the common encoding method in Simplified Chinese is GB2312, which uses two bytes to represent a Chinese character, so it is theoretically possible to represent a maximum of 256x256=65536 symbols.The issue of Chinese coding needs to be dis
Http://www.hkepc.com /? Id = 1214 FS = c3nl
NVIDIA will launch the Cuda June 17 platform on the same day with the Alibaba geforce GTX 200 family in March 2.0, adding support for precision (Double Precision) computing, in order to provide a more accurate computing result, take the weather image as an example, dr. david Kirk noted that a study using geforce 8800 GTX for WRF-mode image computing compared with Pentium D 2.8 GHz found that geforce 8800 GTX has a 17-fold performance ratio, cost p
system mount and unload (see Linux System Management P406)1) Master the definition of Mount: Mount refers to a device (typically a storage device) that is attached to an existing directory.2) Master the function of the Mount command: Implement file system mount.3) flexibly apply mount command to mount the file system:For example: Mount the/DEV/SDB1 partition to a command on the/WG directory:Mount/dev/sdb1/wg4) Master the function of the Umount command: the implementation of the file system unin
system uninstall.5) Flexible application of the Umount command to implement file system uninstallation:For example, the command to uninstall the file system on/WG:Umount/wg2. Virtual memory concept and setup and management (see Linux System Management P414)1) Master the definition of virtual memory: the so-called virtual memory is a piece of hard disk space is used as memory, also known as swap partition (swap).2) Understand the type of Linux swap pa
, for a generic developer, it is much more complicated to use SQL to create a multiple-form outer join query for a new XML document than to write XQuery.The popularity of XML has forced the Standard group workgroup to extend the SQL specification to incorporate XML processing capabilities. The sql/xml standardization of SQLX Group, INCITS H2 Group, and ISO/IEC JTC1/SC32/WG2 is working to extend the SQL standard to enable it to process XML data. mis
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.