Explain can we have constant volatile variable, Computer Engineering

Const and volatile keywords should not be used together due to both are opposite in nature.

A variable is declared as "const" means its value is not able to be altered but if it is declared as "Volatile" then it is not under control.                

 

 

Posted Date: 4/6/2013 3:04:48 AM | Location : United States







Related Discussions:- Explain can we have constant volatile variable, Assignment Help, Ask Question on Explain can we have constant volatile variable, Get Answer, Expert's Help, Explain can we have constant volatile variable Discussions

Write discussion on Explain can we have constant volatile variable
Your posts are moderated
Related Questions
why they are essential in a bus oriented system? Ans) In a multiplexed bus system, many devices are linked to a common bus. If 2 or more devices attempt to use the bus at the si

Write a function that will prompt the user individually for a filename and extension and will make and return a string with the form 'filename.ext'.

Describe CMOS inverter. Ans: CMOS inverter that is also called Complementary MOSFET Inverters, are several of the most broadly used and adaptable MOSFET inverters utilized i

Implement the following function using a 3 line to 8 line decoder. S (A,B,C) =   ∑ m(1,2,4,7) C (A,B,C) =  ∑ m ( 3,5,6,7)         Ans. Given function S (A,B,C) = m (1,2,4,7)

Define congestion and grade of service. Congestion : This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telec

Illustrate the benefits of Functional model Functional model shows how values are computed. This model describes decisions or object structure without regard for sequencing. I

Different systems that can participate in grid computing as platform are:  Windows 3.1, 95/98, NT, 2000 XP , DOS, OS/2, , supported by  Intel ( x86); Mac OS  A/UX (Unix)  sup

What do you mean by underflow and overflow of data? Underflow and overflow of data: When the value of the variable is either too long or too small for the data type to hold,

Eight-stage process - Conjunctive normal forms: Hence we notice the following eight-stage process converts any sentence with CNF as:  1.  Eliminate all arrow connectives by

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret