Skip to main content

ASCII Table: Complete Chart of Codes, Hex, Binary & Symbols


ASCII Table: Complete Chart of Codes, Hex, Binary & Symbols


Computers do not understand language. They do not know what the letter "A" is, or what a question mark looks like. At their core, computers are giant calculators that only understand electricity: On or Off. 1 or 0.

To bridge the gap between human language and machine binary, we need a map. We need a standard agreement that says, "When the computer sees this specific number, it should display this specific letter."

That map is the ASCII Table.

Whether you are a student learning to code, a network engineer debugging a router, or just someone trying to understand why your text file looks like garbage characters, understanding the ASCII table is the first step to digital literacy.

This comprehensive guide will explain what the ASCII table is, how to read it, why it was created, and how it is still the foundation of the modern internet.

What Is the ASCII Table?

ASCII stands for American Standard Code for Information Interchange.

The ASCII Table is a standardized reference chart that assigns a unique number to every character used in English text. This includes:

  • Uppercase Letters: A–Z

  • Lowercase Letters: a–z

  • Numbers: 0–9

  • Symbols: @, #, $, %, etc.

  • Control Codes: Invisible commands like "New Line" or "Delete."

It essentially serves as a translation dictionary between humans and computers.

The Basic Concept

When you press the "A" key on your keyboard, your keyboard doesn't send the letter "A" to the computer. It sends a specific electrical signal. The computer translates that signal into the number 65.

The computer then looks up number 65 in the ASCII Table standard.

  • 65 = "A"

The computer then draws the pixels for "A" on your screen. Without this table, the computer would have no idea which shape to draw.

Why Do We Need an ASCII Chart?

Before ASCII was invented in the early 1960s, there was chaos. Different computer manufacturers created their own secret codes.

If an IBM computer sent the number "10" to a different brand of computer, the IBM machine might mean "Letter A," while the receiving computer thought it meant "Number 9." Data transfer was impossible.

The ASCII chart solved this by creating a universal standard. It ensured that the number 65 meant "Capital A" on every computer, from every manufacturer, everywhere in the world (initially focusing on English).

Even today, 60 years later, the ASCII table is the backbone of text files, HTML code, URLs, and programming source code.

How to Read an ASCII Code Chart

When you look at an ASCII chart, you will typically see columns for different numbering systems. It is important to understand what each column represents.

1. The Decimal Column (Dec)

This is the standard counting system humans use (0-9).

  • Example: The decimal value for "A" is 65.

  • Use: This is the easiest number to remember and use in basic programming loops.

2. The Hexadecimal Column (Hex)

Hexadecimal is a Base-16 counting system used heavily in computing because it represents binary data more concisely.

  • Example: The Hex value for "A" is 41.

  • Use: You will see this in memory dumps, color codes, and URL encoding (e.g., a space is %20, which comes from the Hex value 20).

3. The Binary Column (Bin)

This is the raw language of the computer—zeros and ones.

  • Example: The binary value for "A" is 01000001.

  • Use: Helpful for understanding how data is physically stored on the hard drive or transmitted over a wire.

4. The Character Column (Char)

This is the human-readable result—the letter or symbol that appears on the screen.

The Structure of the ASCII Table

The standard ASCII table contains 128 characters, numbered from 0 to 127.

Why 128?
Because standard ASCII is a 7-bit code.
In binary, 7 bits (1111111) can represent a maximum of 128 unique values ($2^7 = 128$).

The table is divided into three distinct sections:

Section 1: Control Characters (0–31 and 127)

The first 32 characters (0 through 31) are non-printable. You cannot see them on the screen.

These were originally designed for "Teletype" machines (old typewriter-style terminals). They didn't print ink; they controlled the machinery.

  • 0 (Null): Used to mark the end of a string of text.

  • 7 (Bell): Originally caused the teletype machine to physically ring a bell. Today, it might make your computer make a "beep" sound.

  • 8 (Backspace): Moves the cursor back one space.

  • 10 (Line Feed): Moves the paper up one line (modern "New Line").

  • 13 (Carriage Return): Moves the print head back to the start of the line.

  • 27 (Escape): Used to interrupt a process.

  • 127 (Delete): Included at the very end of the table.

Educational Note: Have you ever seen a text file where all the lines are squished into one long line? That is usually an ASCII confusion between "Line Feed" (10) and "Carriage Return" (13). Different operating systems use different combinations of these invisible ASCII characters to mark the end of a line.

Section 2: Standard Printable Characters (32–126)

These are the characters you see on your keyboard. This section is the most "useful" part of the table for general users.

  • 32 (Space): The "Space" bar is not "nothing." It is a character with the value 32. This is crucial for programmers to know—a blank space is data.

  • 48–57: The digits 0 through 9. (Note: The ASCII value for the number "0" is 48, not 0. This is a common point of confusion).

  • 65–90: The Uppercase Alphabet (A–Z).

  • 97–122: The Lowercase Alphabet (a–z).

  • Symbols: Scattered throughout (e.g., 64 is @).

Section 3: Extended ASCII (128–255)

This is where things get complicated.
Standard ASCII only uses 7 bits (0-127). But computers work in 8-bit bytes. An 8-bit byte can store 256 values ($2^8 = 256$).

This left the numbers 128 through 255 empty.
In the 1980s and 90s, people started filling this empty space with "Extended ASCII."

  • The Idea: Use the extra space for foreign letters (like ñ, ü, é) and drawing symbols (╔, ╗, ═).

  • The Problem: There was no standard.

    • In the US, code 130 might be é.

    • In Israel, code 130 might be a Hebrew letter.

    • In Russia, code 130 might be a Cyrillic letter.

Because "Extended ASCII" varies depending on which system you are using, an Extended ASCII Chart is not always universal. If you open a text file from a different country and see weird symbols ( or Ã), it is often because of a mismatch in how the Extended ASCII region is being interpreted.

ASCII vs. Unicode: The Modern Context

You might be wondering: "If ASCII only has English letters, how do we use emojis or write in Chinese?"

ASCII was created in the 1960s in the USA. It was never designed for the global internet. To solve this, the world moved to Unicode.

  • ASCII: 128 characters. (English only).

  • Unicode: Over 140,000 characters. (Every language, emoji, and symbol in human history).

However, ASCII is NOT dead.
Unicode was designed to be backward compatible. The first 128 characters of Unicode are identical to the ASCII table.

  • ASCII "A" = 65.

  • Unicode "A" = 65.

This means every modern UTF-8 file (the standard for the web) is actually just an ASCII file until you type a special character. Understanding ASCII is the prerequisite to understanding Unicode.

ASCII Code Numbers: A Breakdown by Group

To help you navigate an ASCII conversion table, it helps to memorize the starting points of the major groups. This allows you to mentally estimate values without looking them up constantly.

The Number Group (48–57)

Computer text numbers are different from mathematical numbers.

  • '0' = 48

  • '1' = 49

  • ...

  • '9' = 57

The Uppercase Group (65–90)

  • 'A' = 65

  • 'B' = 66

  • ...

  • 'Z' = 90

The Lowercase Group (97–122)

  • 'a' = 97

  • 'b' = 98

  • ...

  • 'z' = 122

Interesting Pattern:
The difference between an uppercase letter and its lowercase version is exactly 32.

  • 'A' (65) + 32 = 'a' (97).

  • 'B' (66) + 32 = 'b' (98).

In binary, the number 32 represents a single bit flip. This clever design allows computers to switch between Upper and Lower case extremely fast just by flipping one electrical switch (bit).

Real-World Applications of the ASCII Table

Why should you care about a 60-year-old table? Because it is hidden in almost everything you do digitally.

1. URL Encoding (The %20 Mystery)

Have you ever copied a website link and seen %20 appear where the spaces used to be?

  • my vacation photos.jpg becomes my%20vacation%20photos.jpg.

  • This happens because URLs cannot contain spaces.

  • The system replaces the space with its Hexadecimal ASCII Code.

  • Look at the ASCII table: Space = Decimal 32 = Hex 20.

2. Programming Logic

If you are learning Java, Python, or C++, you will often sort lists of words. Computers sort alphabetically by comparing ASCII values.

  • Because 'A' (65) is less than 'a' (97), computers technically sort uppercase words before lowercase words.

  • Example: "Zebra" comes before "apple" in a raw ASCII sort.

3. File Formats

If you open an image file (like a .JPG) in a text editor, you will see a mess of random gibberish. That is the text editor trying desperately to match the binary image data to the ASCII table. It is trying to translate pixel colors into letters, resulting in nonsense.

4. Data Transfer

When you download a file, computers often specify if the transfer is "ASCII" (text) or "Binary" (images/programs).

  • ASCII Mode: The computer might slightly modify the file (like fixing those Line Feed/Carriage Return issues discussed earlier).

  • Binary Mode: The computer transfers the exact 1s and 0s without touching them.

Limitations of ASCII

While reliable, the ASCII table is strictly limited.

  1. Language Barrier: It cannot support Spanish accents (ñ), German umlauts (ü), or Asian characters.

  2. Size: It is limited to 128 characters (or 256 with extensions).

  3. Confusion: The "Extended ASCII" section (128-255) is not standardized, leading to corrupted text when moving files between older computers.

Frequently Asked Questions (FAQ)

What is the ASCII code for a blank space?

The ASCII code for a space is 32. It is commonly mistaken for 0, but 0 is "Null" (nothing). 32 is a "Space" (a visible gap).

How do I type ASCII characters on a keyboard?

On Windows, you can type any ASCII character by holding the ALT key and typing the decimal code on your number pad.

  • Example: Hold Alt + type 6 then 5 = A.

  • Example: Hold Alt + type 6 then 4 = @.

Why does the table start at 0 instead of 1?

Computers count starting from zero. In binary systems, 00000000 is the first possible value. Therefore, the index of the table begins at 0 (Null).

What is the difference between ASCII and UTF-8?

ASCII is a subset of UTF-8. ASCII uses 1 byte per character and supports only English. UTF-8 uses between 1 and 4 bytes per character and supports all languages. UTF-8 was designed so that any valid ASCII file is also a valid UTF-8 file.

Is ASCII binary or hexadecimal?

ASCII is the mapping. Binary and Hexadecimal are just ways to represent the mapping number. You can express the ASCII code for 'A' as decimal (65), binary (01000001), or hex (41). They all refer to the same character in the table.

What is "High ASCII"?

"High ASCII" usually refers to the Extended ASCII codes from 128 to 255. These bits were "high" because the 8th bit (the most significant bit) is set to 1. Standard ASCII is sometimes called "Low ASCII" (0-127).


Comments

Popular posts from this blog

QR Code Guide: How to Scan & Stay Safe in 2026

Introduction You see them everywhere: on restaurant menus, product packages, advertisements, and even parking meters. Those square patterns made of black and white boxes are called QR codes. But what exactly are they, and how do you read them? A QR code scanner is a tool—usually built into your smartphone camera—that reads these square patterns and converts them into information you can use. That information might be a website link, contact details, WiFi password, or payment information. This guide explains everything you need to know about scanning QR codes: what they are, how they work, when to use them, how to stay safe, and how to solve common problems. What Is a QR Code? QR stands for "Quick Response." A QR code is a two-dimensional barcode—a square pattern made up of smaller black and white squares that stores information.​ Unlike traditional barcodes (the striped patterns on products), QR codes can hold much more data and can be scanned from any angle.​ The Parts of a ...

PNG to PDF: Complete Conversion Guide

1. What Is PNG to PDF Conversion? PNG to PDF conversion changes picture files into document files. A PNG is a compressed image format that stores graphics with lossless quality and supports transparency. A PDF is a document format that can contain multiple pages, text, and images in a fixed layout. The conversion process places your PNG images inside a PDF container.​ This tool exists because sometimes you need to turn graphics, logos, or scanned images into a proper document format. The conversion wraps your images with PDF structure but does not change the image quality itself.​ 2. Why Does This Tool Exist? PNG files are single images. They work well for graphics but create problems when you need to: Combine multiple graphics into one file Create a professional document from images Print images in a standardized format Submit graphics as official documents Archive images with consistent formatting PDF format solves these problems because it can hold many pages in one file. PDFs also...

Compress PDF: Complete File Size Reduction Guide

1. What Is Compress PDF? Compress PDF is a process that makes PDF files smaller by removing unnecessary data and applying compression algorithms. A PDF file contains text, images, fonts, and structure information. Compression reduces the space these elements take up without changing how the document looks.​ This tool exists because PDF files often become too large to email, upload, or store efficiently. Compression solves this problem by reorganizing the file's internal data to use less space.​ 2. Why Does This Tool Exist? PDF files grow large for many reasons: High-resolution images embedded in the document Multiple fonts included in the file Interactive forms and annotations Metadata and hidden information Repeated elements that aren't optimized Large PDFs create problems: Email systems often reject attachments over 25MB Websites have upload limits (often 10-50MB) Storage space costs money Large files take longer to download and open Compression solves these problems by reduc...

Something Amazing is on the Way!

PDF to JPG Converter: Complete Guide to Converting Documents

Converting documents between formats is a common task, but understanding when and how to do it correctly makes all the difference. This guide explains everything you need to know about PDF to JPG conversion—from what these formats are to when you should (and shouldn't) use this tool. What Is a PDF to JPG Converter? A PDF to JPG converter is a tool that transforms Portable Document Format (PDF) files into JPG (or JPEG) image files. Think of it as taking a photograph of each page in your PDF document and saving it as a picture file that you can view, share, or edit like any other image on your computer or phone. When you convert a PDF to JPG, each page of your PDF typically becomes a separate image file. For example, if you have a 5-page PDF, you'll usually get 5 separate JPG files after conversion—one for each page. Understanding the Two Formats PDF (Portable Document Format) is a file type designed to display documents consistently across all devices. Whether you open a PDF o...

Password: The Complete Guide to Creating Secure Passwords

You need a password for a new online account. You sit and think. What should it be? You might type something like "MyDog2024" or "December25!" because these are easy to remember. But here is the problem: These passwords are weak. A hacker with a computer can guess them in seconds. Security experts recommend passwords like "7$kL#mQ2vX9@Pn" or "BlueMountainThunderStrike84". These are nearly impossible to guess. But they are also nearly impossible to remember. This is where a password generator solves a real problem. Instead of you trying to create a secure password (and likely failing), software generates one for you. It creates passwords that are: Secure: Too random to guess or crack. Unique: Different for every account. Reliably strong: Not subject to human bias or predictable patterns. In this comprehensive guide, we will explore how password generators work, what makes a password truly secure, and how to use them safely without compromising you...

Images to WebP: Modern Format Guide & Benefits

Every second, billions of images cross the internet. Each one takes time to download, uses data, and affects how fast websites load. This is why WebP matters. WebP is a newer image format created by Google specifically to solve one problem: make images smaller without making them look worse. But the real world is complicated. You have old browsers. You have software that does not recognize WebP. You have a library of JPEGs and PNGs that you want to keep using. This is where the Image to WebP converter comes in. It is a bridge between the old image world and the new one. But conversion is not straightforward. Converting images to WebP has real benefits, but also real limitations and trade-offs that every user should understand. This guide teaches you exactly how WebP works, why you might want to convert to it (and why you might not), and how to do it properly. By the end, you will make informed decisions about when WebP is right for your situation. 1. What Is WebP and Why Does It Exist...

Investment: Project Growth & Future Value

You have $10,000 to invest. You know the average stock market historically returns about 10% per year. But what will your money actually be worth in 20 years? You could try to calculate it manually. Year 1: $10,000 × 1.10 = $11,000. Year 2: $11,000 × 1.10 = $12,100. And repeat this 20 times. But your hands will cramp, and you might make arithmetic errors. Or you could use an investment calculator to instantly show that your $10,000 investment at 10% annual growth will become $67,275 in 20 years—earning you $57,275 in pure profit without lifting a finger. An investment calculator projects the future value of your money based on the amount you invest, the annual return rate, the time period, and how often the gains compound. It turns abstract percentages into concrete dollar amounts, helping you understand the true power of long-term investing. Investment calculators are used by retirement planners estimating nest eggs, young people understanding the value of starting early, real estate ...

Standard Deviation: The Complete Statistics Guide

You are a teacher grading student test scores. Two classes both have an average of 75 points. But one class has scores clustered tightly: 73, 74, 75, 76, 77 (very similar). The other class has scores spread wide: 40, 60, 75, 90, 100 (very different). Both average to 75, but they are completely different. You need to understand the spread of the data. That is what standard deviation measures. A standard deviation calculator computes this spread, showing how much the data varies from the average. Standard deviation calculators are used by statisticians analyzing data, students learning statistics, quality control managers monitoring production, scientists analyzing experiments, and anyone working with data sets. In this comprehensive guide, we will explore what standard deviation is, how calculators compute it, what it means, and how to use it correctly. 1. What is a Standard Deviation Calculator? A standard deviation calculator is a tool that measures how spread out data values are from...

Subnet: The Complete IP Subnetting and Network Planning Guide

You are a network administrator setting up an office network. Your company has been assigned the IP address block 192.168.1.0/24. You need to divide this into smaller subnets for different departments. How many host addresses are available? What are the subnet ranges? Which IP addresses can be assigned to devices? You could calculate manually using binary math and subnet formulas. It would take significant time and be error-prone. Or you could use a subnet calculator to instantly show available subnets, host ranges, broadcast addresses, and network details. A subnet calculator computes network subnetting information by taking an IP address and subnet mask (or CIDR notation), then calculating available subnets, host ranges, and network properties. Subnet calculators are used by network administrators planning networks, IT professionals configuring systems, students learning networking, engineers designing enterprise networks, and anyone working with IP address allocation. In this compre...