Explain naming convention globals, Computer Engineering

Explanation

The values of global variables can be used and changed all over the project within all scripts and libraries. However it is highly recommended to remain the number of global variables small. If global variables tend to be used in a exact project only it is advisable to keep those values in either a project specific library header or in a divide configuration file.

 

Syntax

"g" + [Prefix]+[ShortDescription]

 

Letter "g" shows that the scope of the variable is global. [Prefix] is a lowercase letter that shows the type of the global variable. The rules for [Prefix] are the similar as for "Local scope variables".

 

Examples

  • gnNumOfPersons
  • gsPersonLastname

 

Posted Date: 4/2/2013 6:25:19 AM | Location : United States







Related Discussions:- Explain naming convention globals, Assignment Help, Ask Question on Explain naming convention globals, Get Answer, Expert's Help, Explain naming convention globals Discussions

Write discussion on Explain naming convention globals
Your posts are moderated
Related Questions
Logic manufactures have produced 'large scale' logic (LSI) blocks to achieve complex functions; a typical set of logic functions is that of data storage. There are two main types o

Register-to-Register Architecture In this organization results and operands are not accessed straight from main memory by scalar or vector registers. The vectors that are neede

Describe the various characteristics of UDP protocol. The characteristics of the UDP are as follows: End to end: UDP is transport protocols that can distinguish between

Make a console application with a class 'Account' having variables as id(int) and name (String).Add property 'account-no' which can be set andget. Add a 'ReadOnly' property 'IntRat

With a neat diagram explain operation of time multiplexed space switching. Time division switches, an inlet or an outlet corresponded to a particular subscriber line with one s

Explain the term - ancestors The ancestors of modern age computer were mechanical and electro-mechanical instruments. This ancestry can be traced as back and seventeenth centur

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

Engineering and Scientific Software Engineering  and  Scientific  software  has  been  characterized  with "number crunching" algorithms. Application starts from astronomy t

how to rotate shift right