SlideShare uma empresa Scribd logo
1 de 14
Identifiers www.ustudy.in
Introduction ,[object Object]
There are some existing Java identifiers  sqrt  String  Integer  System  in  out ,[object Object],  test1  x1  aNumber   MAXIMUM  A_1 www.ustudy.in
Identifiers www.ustudy.in
Valid Identifiers ,[object Object]
'a'. .'z', 'A'..'Z', '0'..'9', '_', $
 Identifiers start with letter a1 is legal, 1a is not
 can also start with underscore or dollar sign:   _ $
  Java is case sensitive.  A and  a  are different.www.ustudy.in
Reserved Identifier ,[object Object]
Java reserved identifiers not a complete listboolean		default		for		new    break		do		if		private    case		double		import	  	public    catch		else		instanceOf	return    char		extends		int		void    class		float		long		while www.ustudy.in
Identifiers ,[object Object]
Must not be a Java keyword
See Appendix B for list of keywords

Mais conteúdo relacionado

Mais procurados

Virtual base class
Virtual base classVirtual base class
Virtual base class
Tech_MX
 
08 c++ Operator Overloading.ppt
08 c++ Operator Overloading.ppt08 c++ Operator Overloading.ppt
08 c++ Operator Overloading.ppt
Tareq Hasan
 
class and objects
class and objectsclass and objects
class and objects
Payel Guria
 

Mais procurados (20)

Introduction to c++ ppt
Introduction to c++ pptIntroduction to c++ ppt
Introduction to c++ ppt
 
Variables and Data Types
Variables and Data TypesVariables and Data Types
Variables and Data Types
 
Virtual base class
Virtual base classVirtual base class
Virtual base class
 
Function overloading ppt
Function overloading pptFunction overloading ppt
Function overloading ppt
 
9. Input Output in java
9. Input Output in java9. Input Output in java
9. Input Output in java
 
User Defined Functions
User Defined FunctionsUser Defined Functions
User Defined Functions
 
C functions
C functionsC functions
C functions
 
Structure in C
Structure in CStructure in C
Structure in C
 
Classes and objects
Classes and objectsClasses and objects
Classes and objects
 
Strings in c++
Strings in c++Strings in c++
Strings in c++
 
08 c++ Operator Overloading.ppt
08 c++ Operator Overloading.ppt08 c++ Operator Overloading.ppt
08 c++ Operator Overloading.ppt
 
[OOP - Lec 19] Static Member Functions
[OOP - Lec 19] Static Member Functions[OOP - Lec 19] Static Member Functions
[OOP - Lec 19] Static Member Functions
 
OOPS Basics With Example
OOPS Basics With ExampleOOPS Basics With Example
OOPS Basics With Example
 
class and objects
class and objectsclass and objects
class and objects
 
Strings in Java
Strings in JavaStrings in Java
Strings in Java
 
Presentation on Function in C Programming
Presentation on Function in C ProgrammingPresentation on Function in C Programming
Presentation on Function in C Programming
 
classes and objects in C++
classes and objects in C++classes and objects in C++
classes and objects in C++
 
Classes and objects
Classes and objectsClasses and objects
Classes and objects
 
Constants in C Programming
Constants in C ProgrammingConstants in C Programming
Constants in C Programming
 
This pointer
This pointerThis pointer
This pointer
 

Semelhante a Identifiers

Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
Aleksandr Yampolskiy
 
Reading and writting
Reading and writtingReading and writting
Reading and writting
andreeamolnar
 
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QACreating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
archwisp
 
Introduction to Intermediate Java
Introduction to Intermediate JavaIntroduction to Intermediate Java
Introduction to Intermediate Java
Philip Johnson
 
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
Ioannis Stais
 
Chapter 2.4
Chapter 2.4Chapter 2.4
Chapter 2.4
sotlsoc
 

Semelhante a Identifiers (20)

Lesson 02 python keywords and identifiers
Lesson 02   python keywords and identifiersLesson 02   python keywords and identifiers
Lesson 02 python keywords and identifiers
 
Class 8 - Java.pptx
Class 8 - Java.pptxClass 8 - Java.pptx
Class 8 - Java.pptx
 
Core java
Core javaCore java
Core java
 
Secure Programming
Secure ProgrammingSecure Programming
Secure Programming
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Esprima - What is that
Esprima - What is thatEsprima - What is that
Esprima - What is that
 
PHP Built-in String Validation Functions
PHP Built-in String Validation FunctionsPHP Built-in String Validation Functions
PHP Built-in String Validation Functions
 
Core Java Tutorials by Mahika Tutorials
Core Java Tutorials by Mahika TutorialsCore Java Tutorials by Mahika Tutorials
Core Java Tutorials by Mahika Tutorials
 
Reading and writting
Reading and writtingReading and writting
Reading and writting
 
Flow or Type - how to React to that?
Flow or Type - how to React to that?Flow or Type - how to React to that?
Flow or Type - how to React to that?
 
OOP-java-variables.pptx
OOP-java-variables.pptxOOP-java-variables.pptx
OOP-java-variables.pptx
 
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QACreating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
 
Functional Java 8 - Introduction
Functional Java 8 - IntroductionFunctional Java 8 - Introduction
Functional Java 8 - Introduction
 
Unit 1 of java part 2 basic introduction
Unit 1 of java part 2 basic introduction Unit 1 of java part 2 basic introduction
Unit 1 of java part 2 basic introduction
 
Introduction to Intermediate Java
Introduction to Intermediate JavaIntroduction to Intermediate Java
Introduction to Intermediate Java
 
Testing untestable code - IPC12
Testing untestable code - IPC12Testing untestable code - IPC12
Testing untestable code - IPC12
 
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AU...
 
Handout - Introduction to Programming
Handout - Introduction to ProgrammingHandout - Introduction to Programming
Handout - Introduction to Programming
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Chapter 2.4
Chapter 2.4Chapter 2.4
Chapter 2.4
 

Mais de Then Murugeshwari

Mais de Then Murugeshwari (20)

Traffic safety
Traffic safetyTraffic safety
Traffic safety
 
P h indicators
P h indicatorsP h indicators
P h indicators
 
Avogadro's law
Avogadro's lawAvogadro's law
Avogadro's law
 
Resonance
ResonanceResonance
Resonance
 
Microwave remote sensing
Microwave remote sensingMicrowave remote sensing
Microwave remote sensing
 
Newton's law
Newton's lawNewton's law
Newton's law
 
Surface tension
Surface tensionSurface tension
Surface tension
 
Hook's law
Hook's lawHook's law
Hook's law
 
Hook's law
Hook's lawHook's law
Hook's law
 
ERP components
ERP componentsERP components
ERP components
 
Database fundamentals
Database fundamentalsDatabase fundamentals
Database fundamentals
 
Mosfet
MosfetMosfet
Mosfet
 
Operators
OperatorsOperators
Operators
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Bluetooth profile
Bluetooth profileBluetooth profile
Bluetooth profile
 
Router
RouterRouter
Router
 
Operators in java
Operators in javaOperators in java
Operators in java
 
Thread priorities
Thread prioritiesThread priorities
Thread priorities
 
Threads
ThreadsThreads
Threads
 
Virtual ground
Virtual groundVirtual ground
Virtual ground
 

Identifiers