Skip to main content

Share: Morse Code

Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs. Morse code is named after Samuel Morse, an inventor of the telegraph.

International Morse Code, also known as Continental Morse Code, encodes the 26 English letters A to Z, some non-English letters, the Arabic numerals and a small set of punctuation and procedural signals (prosigns). There is no distinction between upper and lower case letters.

Morse code can be transmitted in a number of ways: as electrical pulses along a telegraph wire, as an audio tone, a radio signal with short and long tones, or as a mechanical, audible, or visual signal e.g. a flashing light  or even a car horn. Some mine rescues have used pulling on a rope, a short pull for a dot and a long pull for a dash.

Morse code is transmitted using just two states - on and off. Historians have called it the first digital code. Morse code may be represented as a binary code, and that is what telegraph operators do when transmitting messages. A Morse code sequence may be made from a combination of:
* short mark, dot or "dit" (.): 1
* longer mark, dash or "dah" (-): 111
* intra-character gap (between the dots and dashes within a character): 0
* short gap (between letters): 000
* medium gap (between words): 0000000

 

Popular posts from this blog

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut...

Share: Artificial Intelligence, The Pros And Cons

Artificial Intelligence (A.I.) has become a major part of everyday life. From search engines and voice assistants to recommendation systems and smart tools, A.I. has changed how people learn, work, and communicate. While it brings many benefits, A.I. also has limitations and risks. Understanding both sides helps us use A.I. wisely and responsibly. Pros of A.I. 1. Increases Efficiency and Productivity A.I. can complete tasks faster than humans, especially repetitive or data-heavy work. Businesses use A.I. to automate routine processes, saving time and reducing mistakes. For students, A.I. tools can help summarise information, organise notes, or check grammar, making learning more efficient. 2. Enhances Learning and Creativity A.I. makes learning more personalised. Students can get instant explanations, examples, and feedback on almost any topic. Creative tools also allow people to design images, write stories, brainstorm ideas, and explore new possibilities that might be difficult to ac...

Share: API

An API (Application Programming Interface) is a set of rules and protocols that allow one software application to interact with another. It defines the methods and data formats that applications use to request and exchange information. APIs are used to allow different systems, services, or components to communicate with each other. APIs typically work by defining endpoints (URLs) where one system can send requests, and the system receiving the request processes it and sends a response back. Here's a basic overview of how the process works: 1. Client (Requester): The system (or program) that initiates the request. This could be a user interacting with an app, or a program that needs to fetch data from another service. 2. API Endpoint: An endpoint is a specific URL or URI (Uniform Resource Identifier) on the server that defines where the request should be sent. 3. Request: The client sends an HTTP request to the API endpoint. This can be one of several types: GET: Retrie...