CHAPTER 9 International Languages and Character Sets
317
Understanding character sets in software
This section provides general information about software issues related to
international languages and character sets.
Pieces in the character set puzzle
There are several distinct aspects to character storage and display by computer
software:
•
Each piece of software works with a character set. A character set is a set
of symbols, including letters, digits, spaces and other symbols.
•
To handle these characters, each piece of software employs a character set
encoding, in which each character is mapped onto one or more bytes of
information, typically represented as hexadecimal numbers. This
encoding is also called a code page.
How are characters represented in
software, and Adaptive Server IQ in
particular?
“Understanding character sets in
software” on page 317
What collations does Adaptive Server
IQ provide?
“Supplied collations” on page 329
How do I ensure that error and
informational messages sent from the
database server to client applications
are sent in the proper language and
character set for my application?
“Character translation for database
messages” on page 336
I have a different character set on client
machines from that in use in the
database. How can I get characters to be
exchanged properly between client and
server?
“Starting a database server using
character set translation” on page
348
What character sets can I use for
connection strings?
“Connection strings and character
sets” on page 338
How do I create a collation that is
different from the supplied ones?
“Creating a database with a custom
collation” on page 351
To answer the question...
Consider reading...
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...