Define keyword and identifiers, Computer Engineering

Assignment Help:

Q. Define Keyword and Identifiers?

Keyword:  A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of that directive whereas if the statement is data-allocation statement then keyword would be a data definition type.

Some illustrations of keywords are: SEGMENT (directive), MOV (statement) etc. 

Identifiers:  An identifier is a name which you apply to an item in your program which you expect to reference.  The 2 kinds of identifiers are label and name.

1.    Name denotes to address of a data item like counter, arr etc.

2.    Label denotes to address of our instruction or process or segment. For illustration

MAIN is the label for a process as below:

  MAIN PROC FAR

                         A20:   BL,45 ; defines a label A20.

Identifier may employ alphabet, digit or special character but it always starts with an alphabet.


Related Discussions:- Define keyword and identifiers

How steps of instruction execution can be broken down, Q. How steps of inst...

Q. How steps of instruction execution can be broken down? Let's explain how these steps of instruction execution can be broken down to micro-operations. To make easier this dis

Data structure, Sort the following list using selection sort technique, dis...

Sort the following list using selection sort technique, displaying each step. 20,12,25,6,10,15,13

Explain formats supported in linux for executable programs, Explain Formats...

Explain Formats supported in Linux for executable programs. Linux supports two formats for executable programs: a. Out-binary format b. ELF - dynamic libraries

The different storage classes in c, What are the different storage classes ...

What are the different storage classes in C?  Storage classes in C  There are four storage classes in C:  a. Automatic storage class:  b. Register storage class:  c

State the web server security through ssl, Web server security through SSL ...

Web server security through SSL (Secure Socket Layer) As it is well known that the Intranets and internet are purely based on use of powerful web servers to deliver information

What are the engineering applications in parallel computing, Engineering Ap...

Engineering Applications A number of the engineering applications are: 1. Simulations of artificial ecosystems  2. Airflow circulation over aircraft components Airflow

What are advantages and disadvantages of using eeprom, What are advantages ...

What are advantages and disadvantages of using EEPROM? The benefits are that EEPROM do not have to be removed for erasure. Also it is possible to delete the cell contents selec

Conversion of decimal number 82.67 to its binary equivalent, Conversion of ...

Conversion of Decimal number 82.67 to its Binary Equivalent Ans. Firstly see the integer part 82 and determine its binary equivalent  as The Binary equivalent is (101001

How to creating a key pair, How to Creating a Key Pair You can make a...

How to Creating a Key Pair You can make a key pair using the Strong Name tool (Sn.exe). Key pair files usually have an .snk extension. To create a key pair at the command

Programming with parallel virtual machine, Q. Programming with parallel vir...

Q. Programming with parallel virtual machine? The general method for writing a program with PVM is like this:  A user writes one or more sequential programs in C++, C or FOR

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd