Importance of Coding Standards

Programming Help for Beginners

We write programs to instruct computers. When programming using a high level programming language like C++ or Java, we are using a syntax that is somewhat closer to human languages. However, we use these programs as inputs to either compilers or interpreters to be converted to computer understandable binary format. For this reason, as far as the program code adheres to the syntax of the used programming languages, the compilers and interpreters never bother about the layout or visual formatting of the program code. However, as human programmers, we ourselves need to bother about the aesthetics of the program code.

What is a Coding Standard?

A coding standard is a set of guidelines, rules and regulations on how to write code. Usually a coding standard includes guide lines on how to name variables, how to indent the code, how to place parenthesis and keywords etc. The idea is to be consistent in programming so that, in case of multiple people working on the same code, it becomes easier for one to understand what others have done. Even for individual programmers, and especially for beginners, it becomes very important to adhere to a standard when writing the code. The idea is, when we look at our own code after some time, if we have followed a coding standard, it takes less time to understand or remember what we meant when we wrote some piece of code.

Coding Standards Make a Difference

Look at the following example:

int volume(int i, int j, int k) {
int vol;
vol = i * j * k;
return vol;
}

Looking at this code at a glance, it takes some time for one to understand that this function calculates the volume. However if we adhere to a naming convention for variables and method names, we could make the code more readable.

Here are few sample conventions:

  • use meaningful variable names
  • use verbs in method names
  • use nouns for variables
  • use 4 spaces to indent
  • int calculateVolume(int height, int width, int length) {
    int volume = 0;
    volume = height * width * length;
    return volume;
    }

    It takes more time to type this code, however this saves far more time. This code is far more readable than its original version. With a little bit of effort, we could make the code much more understandable.

    The Benefits

    It is not only the readability that we get through a coding standard in programming. Writing more secure code could also be encouraged through a coding convention. As an example, in C++ we could say that each pointer variable must be initialized to NULL.

    char* myName = NULL;

    This ensures that we would not corrupt memory while using this pointer variable.

    Code readability is just one of the aspects of maintainability. Coding standards help a great deal with program maintainability, our ability to change programs with ease. Consistency imposed through a coding standard is a key factor to achieve success in maintaining prorams.

    Defining Your Own Coding Standard

    A programmer can define his or her own coding convention and adhere to that in writing programms. However there are many coding conventions available on the Internet. Those who program in Java should have a look into http://java.sun.com/docs/codeconv/html/CodeConvTOC.doc.html - Code Conventions for the Java Programming Language by Sun.

    For C++ coding standards, I would recommend that you have a look into http://www.bbc.co.uk/guidelines/webdev/AppB.Cpp_Coding_Standards.htm - C++ Coding Standards from BBC.

    http://oopweb.com/CPP/Documents/CPPHOWTO/Volume/C++Programming-HOWTO-14.html - C++ Programming HOWTO has some C++ Coding Conventions and also a bunch of links that lead to several coding standards that you can pick from.

    John Dirk
    Programming Consultant
    http://www.programminghelp4u.com/
    Programming ( Assignment / Project ) Help

    recurring maid service Wilmette ..
    In The News:

    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
    South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
    Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
    Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
    Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
    NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
    Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
    Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
    Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
    Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
    Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.
    Discover how iOS 26's new Adaptive Power feature automatically extends iPhone battery life by learning your usage patterns and adjusting performance intelligently.
    New TikTok malware campaign tricks users into running PowerShell commands that download Aura Stealer, which steals credentials and authentication tokens.
    Gaia Family offers fixed upfront pricing for IVF cycles with unlimited embryo transfers and financial protection, partnering with over 100 U.S. fertility clinics.
    The Jetsons Act aims to position Pennsylvania as a leader in advanced air mobility by establishing regulations for hybrid ground-air vehicles.
    Fake Geek Squad invoice emails are targeting users with convincing charges and urgent phone numbers to steal personal information and money.
    Fox News Digital's artificial intelligence newsletter digs into a robot in Russia that faceplanted, George Clooney's alarm and OpenAI's rivalry with the New York Times.

    Spyware Statistics -- Whats New in May 2005?

    Although statistics often is blamed for various deadly sins --... Read More

    Marketing Your WinRunner Team

    It won't matter how effective your WinRunner Team is if... Read More

    Reloading Windows XP

    If you have been running Windows XP for a couple... Read More

    Troubleshoot Windows with Task Manager

    Task Manager is a Windows system utility that displays thetasks... Read More

    Not All Project Management Software is Created Equal

    The purpose of Project Management Software is to provide an... Read More

    Configure Windows Indexing Service for Performance

    The Windows Indexing Service provides you with the ability to... Read More

    Spyware Protection: A Must for Any Home Computer

    Now that spyware is the single most dangerous threat to... Read More

    Microsoft CRM Modification ? Overview for IT Specialist

    Microsoft CRM is now on the scene and it is... Read More

    IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java

    Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More

    Microsoft CRM Integration & Customization: SharePoint Document Gateway

    MS CRM is very close to document workflow automation, including... Read More

    Popular Fleet Maintenance Programs

    Some companies that are in need of fleet management may... Read More

    Spyware, Adware, etc. -- Terms and Common Sense

    When reading an article where some term is used often,... Read More

    Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

    We'll give you non formal view, based on our consulting... Read More

    Software Engineering: An Introduction

    Software Engineering is the Systematic Approach for analysis design implementation... Read More

    Intro to UNIX Shells

    A UNIX Shell is in simplest terms, a command line... Read More

    Best Practices In Choosing Network Monitoring Software

    Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

    Corel WordPerfect 7 Macro Programming Example

    Case study: A secretary using Corel WordPerfect 7 is often... Read More

    How To Choose A Fire Wall Software Program

    In the real world a "fire wall" is a fireproof... Read More

    OLAP, An Alternative Technology Over Spreadsheets

    Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More

    How to Get The Best Accounting Software For Your Small Business

    Buying accounting software is a major investment. It's an important... Read More

    Data Quality Best Practices for Salesforce.com

    Executive SummaryAn effective plan for entering, cleaning and updating the... Read More

    Hubris - Definition: Microsofts Passport

    Before September of 1995, Microsoft ignored the Internet because their... Read More

    Microsoft Great Plains Reporting ? Overview for Developer

    Looks like Microsoft Great Plains becomes more and more... Read More

    Microsoft Great Plains & CRM in Transportation & Logistics ? Overview

    Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More

    Microsoft Great Plains Inventory Control ? Overview For Consultant

    Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

    last minute cleaning help Highland Park ..