Browse Definitions:

ASCII symbols

Special ASCII symbols can be generated in common versions of Windows applications by activating the keyboard NUM LOCK function, pressing the ALT key, and entering certain numbers in the numeric keypad (located on the right-hand end of the keyboard) while the ALT key is held down. The symbol appears when the ALT key is released, after the number has been entered.

The following table denotes the symbols available using this technique. These symbols are generally not found on keyboards, but they are viewable in most word processors and Web browsers.

An extended set of symbols is viewable in more advanced Web browsers. We are currently preparing a table of extended symbols available with Unicode.

Symbol Activate NUM LOCK,
hold ALT down, and
enter these numerals
Description Example of usage
¤ 15 Wingding  
20 Section or paragraph symbol ... as seen in ¶2.3 ...
§ 21 Section or subsection symbol Please refer to §3.5.5. ...
Ç 128 Non-English text  
ü 129 Non-English text  
é 130 Accented letter e café
â 131 Non-English text  
ä 132 Non-English text  
à 133 Non-English text  
å 134 Non-English text  
ç 135 Non-English text garçon
ê 136 Non-English text  
ë 137 Non-English text  
è 138 Non-English text  
ï 139 Non-English text  
î 140 Non-English text  
ì 141 Non-English text  
Ä 142 Non-English text  
Å 143 Non-English text Ångström
É 144 Non-English text  
æ 145 Latin or ancient plural,
technical text
formulæ, antennæ
Æ 146 Ancient spelling Æsop's fables
ô 147 Non-English text  
ö 148 Non-English text Ångström
ò 149 Non-English text  
û 150 Non-English text  
ù 151 Non-English text  
ÿ 152 Non-English text  
Ö 153 Non-English text  
Ü 154 Non-English text  
¢ 155 Cents in American currency $0.25 = 25¢
£ 156 Pounds in English currency The magazine costs £1.56
¥ 157 Yen in Japanese currency The book costs ¥2,530
ƒ 159 Mathematical function symbol ƒ(x) = 2x⊃2; + 3x + 5
á 160 Accented letter a Bogotá, Tenochtitlán
í 161 Non-English text  
ó 162 Non-English text  
ú 163 Non-English text  
ñ 164 Non-English text señor, El Niño
Ñ 165 Non-English text  
ª 166 Superscript letter a  
º 167 Degree symbol
(thermal or angular)
68 ºF = 20 ºC
cos 60º = 0.500
¿ 168 Inverted query symbol ¿Tequila, señor?
¬ 170 Logical negation symbol ¬(¬A) = A
½ 171 Text representation of 1/2 7½ inches of snow
¼ 172 Text representation of 1/4 Less than ¼ inch of rain
¡ 173 Inverted exclamation mark ¡Tequila, por favor!
« 174 Opening quotation marks
» 175 Closing quotation marks
¦ 179 Technical text  
ß 225 Technical text  
µ 230 Lowercase Greek mu
Symbol for micro (10-6)
1 µF = 10-6 F
± 241 Plus-or-minus sign 220 ohms ± 5 %
÷ 246 Division sign 24 ÷ 6 = 4
· 250 Multiplication sign (alternative),
especially used in unit descriptors
25 kg · m / s⊃2;
⊃2; 253 Exponent 2 (quantity squared) x⊃2; + y⊃2; = z⊃2;
This was last updated in February 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.