Explain naming convention constants, Computer Engineering

Explanation

Constants are "variables" that cannot be changed within a function- or script-body. The value will always be the similar during script-implementation.

Syntax
"AX_" + [PURPOSE] + {OPTIONAL}

If the constant name having of more than one word those will be separated using an underscore.

Examples
· AX_AUT_VERSION

 

Posted Date: 4/2/2013 6:30:06 AM | Location : United States







Related Discussions:- Explain naming convention constants, Assignment Help, Ask Question on Explain naming convention constants, Get Answer, Expert's Help, Explain naming convention constants Discussions

Write discussion on Explain naming convention constants
Your posts are moderated
Related Questions
In order to calculate the performance of the program, the normal form of analysis of the program is to simply measure the total amount of CPU time needed to implement the various p

What is the difference between the C#.NET and VB.NET? VB.NET - It don't have the XML Documentation. - It don't have the Operator Overloading. - It dont't have the P

Q. Explain about Butterfly permutation? Butterfly permutation:  This kind of permutation is attained by interchanging the most significant bit in address with least significant

Can we specify file transfer in a Web page? Explain with the help of suitable example. Yes, file transfer can be given in a web page. The first field within a URL gives a proto

Q. Describe target processor arrangements? Having seen how to describe one or more target processor arrangements we need to initiate mechanisms for distributing data arrays ove

Explain in detail about Real time (transaction) processing When booking seats on a flight, for illustration, real time (transaction) processing would be used. Response to a que

Event-based Simulator Digital  Logic  Simulation  method  sacrifices  performance  for  rich  functionality:  each active signal  is  calculated  for  every  device  it  propa

Determine the term- Security When using Internet, security can be enhanced using encryption. Debit and credit card transactions can also be protected by a specific type of pas

The 68HC11 series is based on the Motorola 6800/1 programming instruction set and hence is a fairly simple 8 bit microprocessor. The internal structure of the 6800/1 is shown below

Data movement instructions shift data from one location to another. The source and destination locations are verified by the addressing modes, and can be registers or memory. Many