Define keyword and identifiers, Computer Engineering

Assignment Help:

Q. Define Keyword and Identifiers?

Keyword:  A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of that directive whereas if the statement is data-allocation statement then keyword would be a data definition type.

Some illustrations of keywords are: SEGMENT (directive), MOV (statement) etc. 

Identifiers:  An identifier is a name which you apply to an item in your program which you expect to reference.  The 2 kinds of identifiers are label and name.

1.    Name denotes to address of a data item like counter, arr etc.

2.    Label denotes to address of our instruction or process or segment. For illustration

MAIN is the label for a process as below:

  MAIN PROC FAR

                         A20:   BL,45 ; defines a label A20.

Identifier may employ alphabet, digit or special character but it always starts with an alphabet.


Related Discussions:- Define keyword and identifiers

Determine the begin - end keywords, Determine the begin - end keywords ...

Determine the begin - end keywords Group several statements together. Cause the statements to be evaluated sequentially (one at a time) -> Any timing within sequential group

Fundamental difference between smart card and e-cash, What is the fundament...

What is the fundamental difference between the transactions made using Smart Card and E-cash? Smart Card and E-Cash: E-cash storable smart cards can dispense and store ca

Data manipulation is essential, Based on the variables, construct a design ...

Based on the variables, construct a design that haves only main effects of one categorical IV and at least 2 continuous DVs. Discuss what you think the relationship is among the de

Let most segment of a name in dns represents, Let most segment of a name in...

Let most segment of a name in DNS represents? Lest Most segment of a name in DNS shows: Individual computer.

Example of asymptotic notations, Q. Example of asymptotic notations? Th...

Q. Example of asymptotic notations? The function f (n) belongs to the set  (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0

Concurrently read exclusively write, Q. Concurrently read exclusively write...

Q. Concurrently read exclusively write? It's one of the models based on PRAM. In this model, processors access the memory location simultaneously for reading whereas exclusivel

Evidence of intelligent behavior - artificial intelligence, Evidence of int...

Evidence of intelligent behavior - Artificial Intelligence: Machines mean they could simply be personal computers, or they could be robots with embedded automative systems, or

Describe data structures used during passes of assembler, Describe Data str...

Describe Data structures used during passes of assembler and their use. During passes of assembler, the Data structures define as: Pass 1 data base Input source pro

SWOT ANALYSIS, OPPORTUNITIES AND THREATS IN COMPUTER FEILD

OPPORTUNITIES AND THREATS IN COMPUTER FEILD

Write a program to find 2''s complement of a binary number, Q. Write a pro...

Q. Write a program to find 1's and 2's complement of a Binary number. Perform necessary checking that if entered number is not a valid number, ask user to enter valid Binary n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd