Explain naming convention globals, Computer Engineering

Explanation

The values of global variables can be used and changed all over the project within all scripts and libraries. However it is highly recommended to remain the number of global variables small. If global variables tend to be used in a exact project only it is advisable to keep those values in either a project specific library header or in a divide configuration file.

 

Syntax

"g" + [Prefix]+[ShortDescription]

 

Letter "g" shows that the scope of the variable is global. [Prefix] is a lowercase letter that shows the type of the global variable. The rules for [Prefix] are the similar as for "Local scope variables".

 

Examples

  • gnNumOfPersons
  • gsPersonLastname

 

Posted Date: 4/2/2013 6:25:19 AM | Location : United States







Related Discussions:- Explain naming convention globals, Assignment Help, Ask Question on Explain naming convention globals, Get Answer, Expert's Help, Explain naming convention globals Discussions

Write discussion on Explain naming convention globals
Your posts are moderated
Related Questions
application of de moiver theorem in software engineering

Explain about subsystem and object of object oriented modeling A subsystem is a grouping of elements of that constitutes a specification of behaviour offered by other contained

What is Page-Stealer process? This is the Kernel process that makes rooms for the incoming pages, by swapping the memory pages that are not the part of the working set of a pro

Explain the Structure of Virtual Enterprise. The virtual enterprise can be a suitable structure to explore the emerging opportunities for forming value in the information socie

Polymorphism in C++ is the idea that a base class can be inherited by various classes. A base class pointer can point to its child class and a base class array can store dissimilar

Explain the use of SSL to secure the network.  SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u

What is interpreter? An  interpreter is a program that appears to execute a source program as if it were machine language.


What are the different methods used for handling the situation when multiple interrupts occurs? 1) Vectores interrupts 2) Interrupt nesting 3) Simultaneous Requests.

Explain POP (Post Office Protocol). The Post Office Protocol gives remote access to an electronic mail box. The protocol permits a user's mailbox to reside on a computer which