Skip to main content

Explain the Identifiers, Keywords and Tokens

 .

Tokens

A token is the smallest unit used in a C program. Token can define in C as the smallest individual elements in a program that is meaningful to the functioning of a compiler.
The following are the types of tokens: Keywords, Identifiers, Constant, Strings, Operators, etc.

Identifier

Identifier refer to the name of user define variable, array and function. A identifier should be essentially  a sequence of latter and digits. It is a type of string of alphanumeric characters that always begins with either an alphabetic or underscore character. There are specific rules to define the identifiers, and we can not use the already defined keywords present in the C language as identifiers.

 Valid Identifier

 Invalid Identifier

sum12 

12sum 

 Temp

goto 

 emp_12

emp12 


Internal identifier

Internal identifiers are the ones that are not used in any of the external link processes. Internal identifiers, also known as internal names, include the names of local variables. The internal identifier can be a local variable. It has at least 31 significant characters.

External identifier

External identifiers are the ones that are used in an external link process. These identifiers are also known as external names; include function names and global variable names that are shared between source files. The external identifier can be a name of function or a global variable. It has at least 63 significant characters.


Keywords 

Keywords are predefined, reserved words used in programming that have special meaning to the compiler. Keywords are part of the syntax and part of the syntax and they cannot be used as an identifier. These are the reserved words having predefine meaning in c program. These are 32 keywords as following.

 Auto

 double 

int 

struct 

break 

 else

long 

 switch

case 

enum 

register 

typedef 

char 

extern 

return 

 union

continue 

for 

signed 

void 

default  

goto 

sizeof 

volatile 

constant 

 float

short 

unsigned 





Comments

Popular posts from this blog

Important Questions of Data Structure and Algorithm (DSA)

 . 1. What is Data structure? Explain different operations to be performed on data structure. 2. Define stack as ADT. Convert P+Q-(R*S/T+U) - V*W into infix expression to postfix. 3. Define Queue. Explain its type with example. 4.  Difference between stack and Queue. 5. Difference between Linear Queue and circular Queue. 6. Write an algorithm to enqueue and dequeue data element in a circular queue.                              7. Define Linked List. Explain its type. How does double linked List is different from circular linked   List. 8. What is recursion and recursive function? write a recursive function to compute Fibonacci number. 9. What is an AVL tree ? Create an  AVL tree from the following data:      18, 12, 14, 8, 85, 25, 31, 24, 27 10. Define B-tree? How to insertion and deletions of elements can be done in a B-tree. 11. Create an B-tree from the following Data:  ...

BCA Math II old question model solution

 . BCA Math II question model 2018: BCA Math II question model 2019: BCA Math II question model 2020:

Define LAN and WAN

 . Local Area Network (LAN)  A LAN is a network that is used for communicating among computer devices, usually within an office building or home.   LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • • Is limited in size, typically spanning a few hundred meters, and no more than a mile.  Is fast, with speeds from 10 Mbps to 10 Gbps.  Requires little wiring, typically a single cable connecting to each device.  Has lower cost compared to MAN’s or WAN’s.  LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in wired LAN’s. Advantages of LAN :    The data is transferred at an extremely faster rate in local Area Network.  Local area network (LAN) provides higher security. Disadvantages of LAN :   Initial cost of installing local area network is quite high.  Unauthorized user can access critical data of an organization in case LAN ad...