U+1F910 Zipper-Mouth Face
U+1F910 was added in Unicode version 8.0 in 2015. It belongs to the block
This character is a Otro símbolo and is commonly used, that is, in no specific script.
The glyph is not a composition. Its East Asian Width is wide. In bidirectional text it acts as Other Neutral. When changing direction it is not mirrored. U+1F910 offers a line break opportunity at its position, except in some numeric contexts.
The CLDR project calls this character “cara con la boca cerrada con cremallera” for use in screen reading software. It assigns these additional labels, e.g. for search in emoji pickers: boca, cara, cremallera.
This character is designated as an emoji. It will be rendered as colorful emoji on conforming platforms. To reduce it to a monochrome character, you can combine it with
El Wikipedia tiene la siguiente información acerca de este punto de código:
Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy.
Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of privacy and confidentiality. It is often contrasted with social transparency.
Secrecy can exist in a number of different ways: encoding or encryption (where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through government security classification) and obfuscation, where secrets are hidden in plain sight behind complex idiosyncratic language (jargon) or steganography.
Another classification proposed by Claude Shannon in 1948 reads that there are three systems of secrecy within communication:
- Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy.
- Privacy systems, for example, voice inversion, is a special equipment required to recover the message.
- "True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal.
Representaciones
Sistema | Representación |
---|---|
N.º | 129296 |
UTF-8 | F0 9F A4 90 |
UTF-16 | D8 3E DD 10 |
UTF-32 | 00 01 F9 10 |
URL-Quoted | %F0%9F%A4%90 |
HTML hex reference | 🤐 |
Mojibake mal de windows-1252 | 🤠|
Codificación: GB18030 (hexadecimales bytes) | 95 30 CD 30 |
Otros sitios
Registro completo
Propiedad | Valor |
---|---|
8.0 (2015) | |
ZIPPER-MOUTH FACE | |
— | |
Supplementary Private Use Area-A | |
Otro símbolo | |
Common | |
Other Neutral | |
Not Reordered | |
none | |
|
|
✘ | |
|
|
|
|
✘ | |
|
|
|
|
|
|
|
|
|
|
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✔ | |
✔ | |
✘ | |
✔ | |
|
|
Any | |
✔ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
0 | |
0 | |
0 | |
✘ | |
None | |
— | |
NA | |
Other | |
— | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
Sí | |
Sí | |
|
|
Sí | |
|
|
Sí | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
Other | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
Other | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
✘ | |
|
|
None | |
wide | |
Not Applicable | |
— | |
No_Joining_Group | |
Non Joining | |
Ideographic | |
none | |
not a number | |
|
|
U |