10 Programming Tips

(1) Avoid using the same variable again and again for different purposes.

This happens with us that we think that more and more memory will be wasted if we declare seperate variable for each purpose. But, if any debugging is about to be done and program is quite a typical. Then, debugger will get confused and Dry-Run will also not work in such a scenario. So, if your program is small then, you can use the same variable. But, if it is complex, then do not use the same cheap practive.

(2) Use capital letter to variable name for global variables.

You should use capital letters because, there should be distinguishable difference between a local variable and global variable. There should not be any confusion while dry run or debugging.

(3) All the variables should be declared at one place.

This helps the programmer to analyze whether some variable is yet declared or not. If we declare them at different locations, then, a proper manner can not be acheived in your programming. The variables should normally defined just below the function declaration.

(4) There should be proper indenting in whole program.

Indenting helps you understand the program and the logic behind the statements well. This is cheap practice to write the functions, iterations and conditional statements without indenting. It looks like a junk also. There should be a proper demarkation in your mind and the same concept should be followed in all the portions of your program.

(5) Commenting.

Commenting is very much important. Although, there is no relation of them from your logic and programming. But, once you debug your program or new amendments are done, it becomes tedious to understand the logic behind that coding section. That is why, commenting is very neccesary in programming.

(6) Do not use labels.

In some programming languages like BASIC, there is scope of providing labels. Experts say that using such labels produces extra burden in the operating system. So, you should avoid them.

(7) Do not declare unused functions or variables.

This practice is also prohibited. You should not declare such a variable which is not getting used anyewhere. You should check it out when you are going through dry-run also.

(8) Coupling should be avoided cohesion should be increased.

Coupling comes to picture when the output of a function is input to other. This produces a sort of ripple effect and debugging becomes a problem and error-prone programming is found in such state.

(9) Always write the program or check the logic then, come to type.

This is a general practice that people directly sit on system and try to build logic and all the necessary corrections are done. But, such anactivity may produce problems like unused variable (regular declaration and descarding) , unused functions (declare and forget to call or just checking), moving in the wrong direction of logic. So, you should decide things before you come to portray them.

(10) Do not learn programs, try to develop your own logic.

Each person has logic but, there should be flow in that logic. If flow is absent then your ideas can not reach the destination. So, instead of learning an old algorithm, try to your own program based on your logic.

Som Dutt Tripathi is an IT personality. He wants to express many things and want to share his ideas with the world.

local house cleaners Park Ridge ..
In The News:

Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.
Survey of 1,000 students shows teens using AI for personal relationships while two-thirds of parents remain unaware of their children's AI usage.
Cybersecurity experts warn about a ShadowLeak vulnerability that weaponized ChatGPT's Deep Research agent to steal personal data from Gmail accounts through hidden commands.

40/sec to 500/sec

IntroductionSurprised, by the title? well, this is a tour of... Read More

The Secret of the Layer Styles Dialogue

When you double-click a layer in the Layer Palette, you... Read More

Is Your Computer Sick?

Viruses and spyware usually show up on your computer one... Read More

Design a Web Album Using Adobe Photoshop- Part 2

So let's begin crunching down these 300 images using Adobe... Read More

Keeping Track

One of the things we can be as certain of... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

Managing Stress in the Computer Industry - Five Steps to a Stress-free Life

It would be easy to think, like most people apparently... Read More

Microsoft Great Plains Customization Tools ? Overview

Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Microsoft CRM Implementation ? Fundamental CRM Principles Revision

Microsoft CRM is relatively new player on the now becoming... Read More

Benefits of Shareware

Shareware has been fighting the stigma of being misunderstood for... Read More

Microsoft Great Plains Implementation & Customization: Computer Parts Retailer Example

Microsoft Great Plains fits to majority of horizontals and retail... Read More

Snort for Network IDS

What is Snort?Snort is an open source network intrusion detection... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Microsoft Great Plains Integration with Microsoft Access ? Overview for Developer

... Read More

Story Development Software: Good or Evil?

In the early days of the personal computer, we're talking... Read More

MSN Messenger Is A Sweet Way To Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

Microsoft Great Plains IV: Inventory Management

Great Plains Inventory Management (IV) module gives your business a... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Microsoft Navision and Crystal Reports - An Overview

Microsoft Business Solutions ? Navision is an integrated solution for... Read More

Adware and Spyware

What is 'adware'?Adware is basically software or scripts that are... Read More

Causes of ERP Failures

ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More

IT Department Skills to Support Microsoft Great Plains and Microsoft CRM

Microsoft Great Plains as ERP and Microsoft CRM as... Read More

Microsoft Great Plains e-Commerce ? additional considerations for programmer

Microsoft Great Plains, designed back in 1990th as database transferable... Read More

move out cleaning service Glenview ..