Define keyword and identifiers, Computer Engineering

Assignment Help:

Q. Define Keyword and Identifiers?

Keyword:  A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of that directive whereas if the statement is data-allocation statement then keyword would be a data definition type.

Some illustrations of keywords are: SEGMENT (directive), MOV (statement) etc. 

Identifiers:  An identifier is a name which you apply to an item in your program which you expect to reference.  The 2 kinds of identifiers are label and name.

1.    Name denotes to address of a data item like counter, arr etc.

2.    Label denotes to address of our instruction or process or segment. For illustration

MAIN is the label for a process as below:

  MAIN PROC FAR

                         A20:   BL,45 ; defines a label A20.

Identifier may employ alphabet, digit or special character but it always starts with an alphabet.


Related Discussions:- Define keyword and identifiers

Define the concept of encapsulation of OOA, Encapsulation of OOA Encap...

Encapsulation of OOA Encapsulation separates the interface of an abstraction from its implementation. By taking the above example i.e. of a car, we can now categorize them as:

Color scheme in a repeater control, How can you provide an alternating colo...

How can you provide an alternating color scheme in a Repeater control?  AlternatingItemTemplate Like the ItemTemplate element, but rendered for every otherrow (alternating item

Complexity of sequential search, Specified the average case complexity of s...

Specified the average case complexity of sequential search in an array of unsorted elements of size n if the following conditions hold: a)  Probability of the key to be in the a

Cache memories - computer architecture, Cache Memories - computer architect...

Cache Memories - computer architecture: Speed of the primary memory is very low in comparison with the speed of processor For well performance, the processor can't spend

Jsbjj, what are the output deice

what are the output deice

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

What is control function, Q. What is control function? If transfer is t...

Q. What is control function? If transfer is to take place only under a predetermined control condition then this condition can be specified as a control function. For illustrat

I want a computer science homework tutor, I can send you the lecture notes ...

I can send you the lecture notes and assignments, and you will walk me through (either record a screencast, or kind on the assignments in red colored font) steps on how to do the a

Explain the term confidentiality - firewall design policy, Explain the term...

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

Convert the following into pos form, Q. Convert the following into POS form...

Q. Convert the following into POS form 1.  (AB + C + DC)(AB + BC + D) 2.  WYZ + XYZ + W'X'Y + W'XYZ 3.  XY + XZ + X'YZ' 4.   (A+B'+C) (AB+AC') 5.   F(A,B,C,D)=M(0,3,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd