Importance of Coding Standards

Programming Help for Beginners

We write programs to instruct computers. When programming using a high level programming language like C++ or Java, we are using a syntax that is somewhat closer to human languages. However, we use these programs as inputs to either compilers or interpreters to be converted to computer understandable binary format. For this reason, as far as the program code adheres to the syntax of the used programming languages, the compilers and interpreters never bother about the layout or visual formatting of the program code. However, as human programmers, we ourselves need to bother about the aesthetics of the program code.

What is a Coding Standard?

A coding standard is a set of guidelines, rules and regulations on how to write code. Usually a coding standard includes guide lines on how to name variables, how to indent the code, how to place parenthesis and keywords etc. The idea is to be consistent in programming so that, in case of multiple people working on the same code, it becomes easier for one to understand what others have done. Even for individual programmers, and especially for beginners, it becomes very important to adhere to a standard when writing the code. The idea is, when we look at our own code after some time, if we have followed a coding standard, it takes less time to understand or remember what we meant when we wrote some piece of code.

Coding Standards Make a Difference

Look at the following example:

int volume(int i, int j, int k) {
int vol;
vol = i * j * k;
return vol;
}

Looking at this code at a glance, it takes some time for one to understand that this function calculates the volume. However if we adhere to a naming convention for variables and method names, we could make the code more readable.

Here are few sample conventions:

  • use meaningful variable names
  • use verbs in method names
  • use nouns for variables
  • use 4 spaces to indent
  • int calculateVolume(int height, int width, int length) {
    int volume = 0;
    volume = height * width * length;
    return volume;
    }

    It takes more time to type this code, however this saves far more time. This code is far more readable than its original version. With a little bit of effort, we could make the code much more understandable.

    The Benefits

    It is not only the readability that we get through a coding standard in programming. Writing more secure code could also be encouraged through a coding convention. As an example, in C++ we could say that each pointer variable must be initialized to NULL.

    char* myName = NULL;

    This ensures that we would not corrupt memory while using this pointer variable.

    Code readability is just one of the aspects of maintainability. Coding standards help a great deal with program maintainability, our ability to change programs with ease. Consistency imposed through a coding standard is a key factor to achieve success in maintaining prorams.

    Defining Your Own Coding Standard

    A programmer can define his or her own coding convention and adhere to that in writing programms. However there are many coding conventions available on the Internet. Those who program in Java should have a look into http://java.sun.com/docs/codeconv/html/CodeConvTOC.doc.html - Code Conventions for the Java Programming Language by Sun.

    For C++ coding standards, I would recommend that you have a look into http://www.bbc.co.uk/guidelines/webdev/AppB.Cpp_Coding_Standards.htm - C++ Coding Standards from BBC.

    http://oopweb.com/CPP/Documents/CPPHOWTO/Volume/C++Programming-HOWTO-14.html - C++ Programming HOWTO has some C++ Coding Conventions and also a bunch of links that lead to several coding standards that you can pick from.

    John Dirk
    Programming Consultant
    http://www.programminghelp4u.com/
    Programming ( Assignment / Project ) Help

    last minute cleaning help Arlington Heights ..
    In The News:

    NASA's twin ESCAPADE spacecraft launched aboard Blue Origin's New Glenn rocket Thursday afternoon from Cape Canaveral, beginning their journey to Mars with arrival expected in 2027.
    Learn how to set email reminders on iPhone and Android so you never forget to reply again. Simple built-in features help you stay organized and on top of messages.
    Discover how Apple's passkeys revolutionize Mac security by replacing vulnerable passwords with biometric authentication and encryption for ultimate protection.
    New survey reveals 78% of parents fear AI scams targeting their kids, yet nearly half haven't discussed these threats. Learn why this dangerous gap exists.
    Chrome now autofills passport and driver's license info automatically. Google's latest browser update adds official document support with encryption and user control.
    Scammers impersonate Department of Veterans Affairs employees claiming veterans owe money, but real VA communications only direct to VA.gov or official channels.
    The AltoVolo Sigma hybrid-electric aircraft flies 500 miles at 220 mph while operating 80% quieter than helicopters, featuring safety systems and compact design.
    Google search scam alert: fake customer service numbers can give scammers remote control of your phone. Learn how to spot these traps and protect yourself.
    Electric vehicles overtake gas cars in total CO2 savings after just two years of driving, with emissions benefits growing over time as power grids get cleaner.
    Louvre Museum reportedly used "Louvre" as password for surveillance system during $100M jewel heist. Learn how weak passwords put even famous institutions at risk.
    Bipartisan AI jobs bill from Sens. Hawley and Warner would require companies to report AI-related layoffs and hiring to Department of Labor quarterly.
    Joe A. from Shelton, Connecticut, lost $228,000 to a ZAP Solutions cryptocurrency investment scam after his divorce, highlighting rising online fraud.
    AI-powered autonomous trucks from Waabi and Volvo target U.S. freight driver shortage with Level 4 self-driving technology and NVIDIA computing platform integration.
    Survive flight disruptions with expert travel tips: Book early morning flights, download airline apps and know your refund rights during service cuts.
    Apple's iOS 26.1 update delivers major security fixes, performance boosts and enhanced privacy controls for your iPhone. Discover why updating now protects your data.
    Russian hackers use fake CAPTCHA tests to spread dangerous malware targeting governments and journalists. Learn how to protect yourself from these deceptive attacks.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
    Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
    Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
    Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
    Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
    French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
    YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
    Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.

    Basic Steps To Optimize Your Internet Security

    After seeing many people complain about their weak Internet security... Read More

    Microsoft CRM Messaging through Lotus Domino eMail Server - Balanced Solution

    Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More

    Navision Attain C/ODBC Crystal Report ? Customization Example

    Microsoft Business Solutions Navision is main ERP application for European,... Read More

    Cisco Certification: Introduction To ISDN, Part III

    Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More

    Beware of Spyware

    One day, you suddenly realize that your computer started to... Read More

    Spyware Definitions List

    The adware and spyware definitions list is very long. But... Read More

    Navision Attain Database access via C/ODBC in ASP.NET Application

    Navision Software was purchased by Microsoft and now it is... Read More

    Microsoft CRM Implementation & Remote Support

    We would like to give you pluses and minuses of... Read More

    Interactive Mapping Brings Information to Life

    What is Interactive Mapping?Interactive mapping is a visual display medium... Read More

    Running a Program on a Remote Server Using SSH

    How do you run a program on a remote server... Read More

    Software For Your Hard-Drive

    All your software is stored on a hard-drive. But how... Read More

    Software Engineering: An Introduction

    Software Engineering is the Systematic Approach for analysis design implementation... Read More

    Cross-Platform Custom Software Development & Integration ? IT Strategy for Large Corporation

    Microsoft Business Solutions products: Great Plains, MS CRM, Navision, Axapta,... Read More

    Microsoft Great Plains Data Conversion ? Overview For Developer

    Looks like Microsoft Great Plains becomes more and more popular,... Read More

    Introduction To ISDN, Part III: PAP

    Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More

    Groupware: Answers the 5 Questions of Document Collaboration

    Every organization which creates collaborative documents, whether they are budgets,... Read More

    Corporate ERP: Microsoft Great Plains For The Plant In Brazil ? Overview For CIO

    Microsoft Business Solutions Great Plains as new ERP for multinational... Read More

    ERP Implementation: Success Factors

    As seeing large number of implementations ? in our case... Read More

    Microsoft RMS Customization ? PO Items Receiving in Great Plains

    Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

    Oracle Development: JDeveloper 10G ? Java, J2EE, EJB, MVC, XML - Overview For Programmer

    In 2004 Oracle, Inc. made its new step toward J2EE... Read More

    Groupware: What Works the Way Businesses Do?

    GroupwareThe internet is full of 1.5 million to 7 million... Read More

    How to Choose the Right Accounting Software for Your Business

    With any good luck and a good amount of hard... Read More

    Secure File Transfer Using SSH Plus Additional Audit & Automation - FSA Reporting

    In order to meet regulatory and corporate compliance requirements reporting... Read More

    The Dreaded Paper Label - Should it be Used?

    While paper labeling CDs and DVDs may appear to be... Read More

    Open Source Concepts: Dual Licensing Explained

    We were recently faced with a decision: either to let... Read More

    same day cleaning service Wilmette ..