Concepts Of Programming Languages
Concepts Of Programming Languages
12th Edition
ISBN: 9780134997186
Author: Sebesta, Robert W.
Publisher: Pearson,
Expert Solution & Answer
Book Icon
Chapter 5, Problem 1RQ

Explanation of Solution

Names:

To identify an entity present in the program, strings of character are used and it is called as name.

Design issues for the name:

The primary design issues for the name are discussed below:

  • Case sensitivity of the names.
    • The design issue that rise with the case-sensitivity is that language constructs that looks similar must also contain the same meanings as defined.
  • Reserved words or keywords are the special words of the language.
    • Every programming language contains own pre-defined keywords, reserved words.
    • The design issues will be in re-defining the key words which can be confusing and using the reserved words will be better choice in the language design.
    • There will be a readability issue rather than the readability issue.

Some of the example of design issues that occur with the names:

While writing names of the identifier there are some of the naming rules that should be followed and below are some of the example design issues that occur with the names:

  • The name of the identifier should not be as the name of the keyword that is predefined.
    • Some of the keywords such “enum”, “static”, “class” cannot be used as the identifiers name.
  • Constant that are defined should be present in the upper case.
    • Constant variables that are defined to be final are considered as constant.
    • For case sensitive programming language the case of the words plays a vital role that is proper usage of lower case and upper case is required.
    • The variable “run”, “RUN” or “Run” will have different meaning for the case sensitive programming languages.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
If a UDP datagram is sent from host A, port P to host B, port Q, but at host B there is no process listening to port Q, then B is to send back an ICMP Port Unreachable message to A. Like all ICMP messages, this is addressed to A as a whole, not to port P on A. (a)  Give an example of when an application might want to receive such ICMP messages. (b)  Find out what an application has to do, on the operating system of your choice, to receive such messages. (c)  Why might it not be a good idea to send such messages directly back to the originating port P on A?
Discuss how business intelligence and data visualization work together to help decision-makers and data users. Provide 2 specific use cases.
This week we will be building a regression model conceptually for our discussion assignment. Consider your current workplace (or previous/future workplace if not currently working) and answer the following set of questions. Expand where needed to help others understand your thinking:  What is the most important factor (variable) that needs to be predicted accurately at work? Why? Justify its selection as your dependent variable.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning