Define keyword and identifiers, Computer Engineering

Assignment Help:

Q. Define Keyword and Identifiers?

Keyword:  A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of that directive whereas if the statement is data-allocation statement then keyword would be a data definition type.

Some illustrations of keywords are: SEGMENT (directive), MOV (statement) etc. 

Identifiers:  An identifier is a name which you apply to an item in your program which you expect to reference.  The 2 kinds of identifiers are label and name.

1.    Name denotes to address of a data item like counter, arr etc.

2.    Label denotes to address of our instruction or process or segment. For illustration

MAIN is the label for a process as below:

  MAIN PROC FAR

                         A20:   BL,45 ; defines a label A20.

Identifier may employ alphabet, digit or special character but it always starts with an alphabet.


Related Discussions:- Define keyword and identifiers

What is clipboard, Clipboard is a temporary storage location in Windows. Th...

Clipboard is a temporary storage location in Windows. The clipart will kept one piece of information at a time when it is manually added to the clipart or is copied there.

Finite automata, applications of context free grammar

applications of context free grammar

What are the steps followed in testing, What are the steps followed in test...

What are the steps followed in testing? i. Unit testing - The individual components are tested in this method of testing. ii. Module testing - Related collection of independ

Which work process triggers database changes, Which work process triggers d...

Which work process triggers database changes? Update work process

Show the divide and conquer approach, Q. Show the Divide and Conquer approa...

Q. Show the Divide and Conquer approach? Divide and Conquer approach is the way of making a complicated problem easier.  In this approach larger problem (System) is divided int

Encryption techniques to ensute secured transaction on net, Two popular enc...

Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.

Explain what are design patterns, Design Patterns are easy and elegant solu...

Design Patterns are easy and elegant solutions of commonly having problems in software design. Design Patterns make it simpler to reuse successful designs and architectures of expe

Subtraction of 01000-01001 using 2's complement method, Subtraction of 0100...

Subtraction of 01000-01001 using 2's complement method. Ans. Firstly 1's complement of 01001 is 10110 and 2's complement is 10110+ 1 =10111. Thus   01000 =  01000 - 01001

What are the advantages of carrying out simulations, What are the Advantage...

What are the Advantages of carrying out simulations -  saves cost (instead of doing the real thing) -  Safer (scenarios tried out on the simulation first before used in real

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd