Misplaced Pages

Identifier

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

An identifier is a name that identifies (that is, labels the identity of) either a unique object or a unique class of objects, where the "object" or class may be an idea, person, physical countable object (or class thereof), or physical noncountable substance (or class thereof). The abbreviation ID often refers to identity, identification (the process of identifying), or an identifier (that is, an instance of identification). An identifier may be a word, number, letter, symbol, or any combination of those.

#401598

44-788: The words, numbers, letters, or symbols may follow an encoding system (wherein letters, digits, words, or symbols stand for [represent] ideas or longer names) or they may simply be arbitrary. When an identifier follows an encoding system, it is often referred to as a code or id code . For instance the ISO/IEC 11179 metadata registry standard defines a code as system of valid symbols that substitute for longer values in contrast to identifiers without symbolic meaning. Identifiers that do not follow any encoding scheme are often said to be arbitrary Ids ; they are arbitrarily assigned and have no greater meaning. (Sometimes identifiers are called "codes" even when they are actually arbitrary, whether because

88-413: A code word from some dictionary, and concatenation of such code words give us an encoded string. Variable-length codes are especially useful when clear text characters have different probabilities; see also entropy encoding . A prefix code is a code with the "prefix property": there is no valid code word in the system that is a prefix (start) of any other valid code word in the set. Huffman coding

132-411: A label is a sequence of characters that identifies a location within source code . In most languages, labels take the form of an identifier , often followed by a punctuation character (e.g., a colon ). In many high-level languages , the purpose of a label is to act as the destination of a GOTO statement. In assembly language , labels can be used anywhere an address can (for example, as

176-504: A sequence of symbols over T. The extension C ′ {\displaystyle C'} of C {\displaystyle C} , is a homomorphism of S ∗ {\displaystyle S^{*}} into T ∗ {\displaystyle T^{*}} , which naturally maps each sequence of source symbols to a sequence of target symbols. In this section, we consider codes that encode each source (clear text) character by

220-410: A chosen unsigned decimal integer identifying the label. Apart from that, some forms permit or mandate the declaration of a label for later referral, including the special form block which prescribes a naming, and the loop macro that can be identified by a named clause. Immediate departure from a named form is possible by using the return-from special operator. In a fashion similar to C,

264-432: A corresponding sequence of amino acids that form a protein molecule; a type of codon called a stop codon signals the end of the sequence. In mathematics , a Gödel code was the basis for the proof of Gödel 's incompleteness theorem . Here, the idea was to map mathematical notation to a natural number (using a Gödel numbering ). There are codes using colors, like traffic lights , the color code employed to mark

308-423: A form that the recipient understands, such as English or/and Spanish. One reason for coding is to enable communication in places where ordinary plain language , spoken or written, is difficult or impossible. For example, semaphore , where the configuration of flags held by a signaler or the arms of a semaphore tower encodes parts of the message, typically individual letters, and numbers. Another person standing

352-584: A front for the American Black Chamber run by Herbert Yardley between the First and Second World Wars. The purpose of most of these codes was to save on cable costs. The use of data coding for data compression predates the computer era; an early example is the telegraph Morse code where more-frequently used characters have shorter representations. Techniques such as Huffman coding are now used by computer-based algorithms to compress large data files into

396-606: A good case example in a recent-decades, technical-nomenclature context. The capitalization variations seen with specific designators reveals an instance of this problem occurring in natural languages , where the proper noun/common noun distinction (and its complications) must be dealt with. A universe in which every object had a UID would not need any namespaces, which is to say that it would constitute one gigantic namespace; but human minds could never keep track of, or semantically interrelate, so many UIDs. Code In communications and information processing , code

440-419: A great distance away can interpret the flags and reproduce the words sent. In information theory and computer science , a code is usually considered as an algorithm that uniquely represents symbols from some source alphabet , by encoded strings, which may be in some other target alphabet. An extension of the code for representing sequences of symbols over the source alphabet is obtained by concatenating

484-470: A label. Here error is the label. The statement goto can be used to jump to a labeled statement in the code. After a goto , program execution continues with the statement after the label. Two types of labels can be put in a switch statement. A case label consists of the keyword case , followed by an expression that evaluates to integer constant. A default label consists of the keyword default . Case labels are used to associate an integer value with

SECTION 10

#1732858169402

528-412: A more compact form for storage or transmission. Character encodings are representations of textual data. A given character encoding may be associated with a specific character set (the collection of characters which it can represent), though some character sets have multiple character encodings and vice versa. Character encodings may be broadly grouped according to the number of bytes required to represent

572-466: A single switch statement , the integer constant associated with each case label must be unique. There may or may not be a default statement. There is no restriction on the order of the labels within a switch. The requirement that case labels values evaluate to integer constants gives the compiler more room for optimizations. In JavaScript language syntax statements may be preceded by the label: It also possible to use break statement to break out of

616-655: A single character: there are single-byte encodings, multibyte (also called wide) encodings, and variable-width (also called variable-length) encodings. The earliest character encodings were single-byte, the best-known example of which is ASCII . ASCII remains in use today, for example in HTTP headers . However, single-byte encodings cannot model character sets with more than 256 characters. Scripts that require large character sets such as Chinese, Japanese and Korean must be represented with multibyte encodings. Early multibyte encodings were fixed-length, meaning that although each character

660-411: A skunk!"), or AYYLU ("Not clearly coded, repeat more clearly."). Code words were chosen for various reasons: length , pronounceability , etc. Meanings were chosen to fit perceived needs: commercial negotiations, military terms for military codes, diplomatic terms for diplomatic codes, any and all of the preceding for espionage codes. Codebooks and codebook publishers proliferated, including one run as

704-415: A statement in the code. When a switch statement is reached, program execution continues with the statement after the case label with value that matches the value in the parentheses of the switch. If there is no such case label, but there is a default label, program execution continues with the statement after the default label. If there is no default label, program execution continues after the switch. Within

748-403: A transfer of control between these labels. A second method utilizes the reader macros # n = and # n # , the former of which labels the object immediately following it, the latter refers to its evaluated value. Labels in this sense constitute rather an alternative to variables, with # n = declaring and initializing a “variable” and # n # accessing it. The placeholder n designates

792-434: Is a language-independent label, sign or token that uniquely identifies an object within an identification scheme . The suffix "identifier" is also used as a representation term when naming a data element . ID codes may inherently carry metadata along with them. For example, when you know that the food package in front of you has the identifier "2011-09-25T15:42Z-MFR5-P02-243-45", you not only have that data, you also have

836-413: Is a system of rules to convert information —such as a letter , word , sound, image, or gesture —into another form, sometimes shortened or secret , for communication through a communication channel or storage in a storage medium . An early example is an invention of language , which enabled a person, through speech , to communicate what they thought, saw, heard, or felt to others. But speech limits

880-429: Is essential for any kind of symbolic processing. In computer languages , identifiers are tokens (also called symbols ) which name language entities. Some of the kinds of entities an identifier might denote include variables , types , labels , subroutines , and packages . A resource may carry multiple identifiers. Typical examples are: The inverse is also possible, where multiple resources are represented with

924-525: Is the most known algorithm for deriving prefix codes. Prefix codes are widely referred to as "Huffman codes" even when the code was not produced by a Huffman algorithm. Other examples of prefix codes are country calling codes , the country and publisher parts of ISBNs , and the Secondary Synchronization Codes used in the UMTS WCDMA 3G Wireless Standard. Kraft's inequality characterizes

SECTION 20

#1732858169402

968-461: The German tank problem ). Opaque identifiers—identifiers designed to avoid leaking even that small amount of information—include "really opaque pointers " and Version 4 UUIDs . In computer science , identifiers (IDs) are lexical tokens that name entities . Identifiers are used extensively in virtually all information processing systems. Identifying entities makes it possible to refer to them, which

1012-611: The Unicode character set; UTF-8 is the most common encoding of text media on the Internet. Biological organisms contain genetic material that is used to control their function and development. This is DNA , which contains units named genes from which messenger RNA is derived. This in turn produces proteins through a genetic code in which a series of triplets ( codons ) of four possible nucleotides can be translated into one of twenty possible amino acids . A sequence of codons results in

1056-575: The identifier "Model T" identifies the class (model) of automobiles that Ford's Model T comprises; whereas the unique identifier "Model T Serial Number 159,862" identifies one specific member of that class—that is, one particular Model T car, owned by one specific person. The concepts of name and identifier are denotatively equal, and the terms are thus denotatively synonymous ; but they are not always connotatively synonymous, because code names and Id numbers are often connotatively distinguished from names in

1100-402: The code and reaching a label has no effect on the actual execution. Function labels consist of an identifier, followed by a colon. Each such label points to a statement in a function and its identifier must be unique within that function. Other functions may use the same name for a label. Label identifiers occupy their own namespace – one can have variables and functions with the same name as

1144-406: The code blocks: In Common Lisp two ways of defining labels exist. The first one involves the tagbody special operator. Distinguishing its usage from many other programming languages that permit global navigation, such as C , the labels are only accessible in the context of this operator. Inside of a tagbody labels are defined as forms starting with a symbol; the go special form permits

1188-404: The confidentiality of communications, although ciphers are now used instead. Secret codes intended to obscure the real messages, ranging from serious (mainly espionage in military, diplomacy, business, etc.) to trivial (romance, games) can be any kind of imaginative encoding: flowers , game cards, clothes, fans, hats, melodies, birds, etc., in which the sole requirement is the pre-agreement on

1232-491: The encoded strings. Before giving a mathematically precise definition, this is a brief example. The mapping is a code, whose source alphabet is the set { a , b , c } {\displaystyle \{a,b,c\}} and whose target alphabet is the set { 0 , 1 } {\displaystyle \{0,1\}} . Using the extension of the code, the encoded string 0011001 can be grouped into codewords as 0 011 0 01, and these in turn can be decoded to

1276-425: The infantry on the battlefield, etc. Communication systems for sensory impairments, such as sign language for deaf people and braille for blind people, are based on movement or tactile codes. Musical scores are the most common way to encode music . Specific games have their own code systems to record the matches, e.g. chess notation . In the history of cryptography , codes were once common for ensuring

1320-472: The meaning by both the sender and the receiver. Other examples of encoding include: Other examples of decoding include: Acronyms and abbreviations can be considered codes, and in a sense, all languages and writing systems are codes for human thought. International Air Transport Association airport codes are three-letter codes used to designate airports and used for bag tags . Station codes are similarly used on railways but are usually national, so

1364-683: The metadata that tells you that it was packaged on September 25, 2011, at 3:42pm UTC, manufactured by Licensed Vendor Number 5, at the Peoria, IL, USA plant, in Building 2, and was the 243rd package off the line in that shift, and was inspected by Inspector Number 45. Arbitrary identifiers might lack metadata. For example, if a food package just says 100054678214, its ID may not tell anything except identity—no date, manufacturer name, production sequence rank, or inspector number. In some cases, arbitrary identifiers such as sequential serial numbers leak information (i.e.

Identifier - Misplaced Pages Continue

1408-415: The nominal value of the electrical resistors or that of the trashcans devoted to specific types of garbage (paper, glass, organic, etc.). In marketing , coupon codes can be used for a financial discount or rebate when purchasing a product from a (usual internet) retailer. In military environments, specific sounds with the cornet are used for different uses: to mark some moments of the day, to command

1452-470: The operand of a JMP or MOV instruction). Also in Pascal and its derived variations. Some languages, such as Fortran and BASIC , support numeric labels. Labels are also used to identify an entry point into a compiled sequence of statements (e.g., during debugging ). In C a label identifies a statement in the code. A single statement can have multiple labels. Labels just indicate locations in

1496-434: The original naming convention, which had formerly been latent and moot, become painfully apparent, often necessitating retronymy , synonymity , translation/ transcoding , and so on. Such limitations generally accompany the shift away from the original context to the broader one. Typically the system shows implicit context (context was formerly assumed, and narrow), lack of capacity (e.g., low number of possible IDs, reflecting

1540-447: The outmoded narrow context), lack of extensibility (no features defined and reserved against future needs), and lack of specificity and disambiguating capability (related to the context shift, where longstanding uniqueness encounters novel nonuniqueness). Within computer science, this problem is called naming collision . The story of the origination and expansion of the CODEN system provides

1584-452: The range of communication to the distance a voice can carry and limits the audience to those present when the speech is uttered. The invention of writing , which converted spoken language into visual symbols , extended the range of communication across space and time . The process of encoding converts information from a source into symbols for communication or storage. Decoding is the reverse process, converting code symbols back into

1628-488: The same code can be used for different stations if they are in different countries. Occasionally, a code word achieves an independent existence (and meaning) while the original equivalent phrase is forgotten or at least no longer has the precise meaning attributed to the code word. For example, '30' was widely used in journalism to mean "end of story", and has been used in other contexts to signify "the end". Label (programming language) In programming languages ,

1672-406: The same identifier (discussed below). Many codes and nomenclatural systems originate within a small namespace . Over the years, some of them bleed into larger namespaces (as people interact in ways they formerly had not, e.g., cross-border trade, scientific collaboration, military alliance, and general cultural interconnection or assimilation). When such dissemination happens, the limitations of

1716-530: The same information to be sent with fewer characters , more quickly, and less expensively. Codes can be used for brevity. When telegraph messages were the state of the art in rapid long-distance communication, elaborate systems of commercial codes that encoded complete phrases into single mouths (commonly five-minute groups) were developed, so that telegraphers became conversant with such "words" as BYOXO ("Are you trying to weasel out of our deal?"), LIOUY ("Why do you not answer my question?"), BMULD ("You're

1760-467: The sense of traditional natural language naming. For example, both " Jamie Zawinski " and " Netscape employee number 20" are identifiers for the same specific human being; but normal English-language connotation may consider "Jamie Zawinski" a "name" and not an "identifier", whereas it considers "Netscape employee number 20" an "identifier" but not a "name." This is an emic indistinction rather than an etic one. In metadata, an identifier

1804-409: The sequence of source symbols acab . Using terms from formal language theory , the precise mathematical definition of this concept is as follows: let S and T be two finite sets, called the source and target alphabets , respectively. A code C : S → T ∗ {\displaystyle C:\,S\to T^{*}} is a total function mapping each symbol from S to

Identifier - Misplaced Pages Continue

1848-798: The sets of codeword lengths that are possible in a prefix code. Virtually any uniquely decodable one-to-many code, not necessarily a prefix one, must satisfy Kraft's inequality. Codes may also be used to represent data in a way more resistant to errors in transmission or storage. This so-called error-correcting code works by including carefully crafted redundancy with the stored (or transmitted) data. Examples include Hamming codes , Reed–Solomon , Reed–Muller , Walsh–Hadamard , Bose–Chaudhuri–Hochquenghem , Turbo , Golay , algebraic geometry codes , low-density parity-check codes , and space–time codes . Error detecting codes can be optimised to detect burst errors , or random errors . A cable code replaces words (e.g. ship or invoice ) with shorter words, allowing

1892-405: The speaker believes that they have deeper meaning or simply because they are speaking casually and imprecisely.) The unique identifier ( UID ) is an identifier that refers to only one instance —only one particular object in the universe. A part number is an identifier, but it is not a unique identifier—for that, a serial number is needed, to identify each instance of the part design. Thus

1936-500: Was represented by more than one byte, all characters used the same number of bytes ("word length"), making them suitable for decoding with a lookup table. The final group, variable-width encodings, is a subset of multibyte encodings. These use more complex encoding and decoding logic to efficiently represent large character sets while keeping the representations of more commonly used characters shorter or maintaining backward compatibility properties. This group includes UTF-8 , an encoding of

#401598