Fact-checked by Grok 2 weeks ago

Identifier

In and programming, an identifier is a lexical token consisting of a sequence of characters used to name and uniquely reference entities such as variables, functions, classes, constants, or labels within a . These names enable developers to interact with code elements symbolically, distinguishing one from another in a defined . Identifiers must adhere to language-specific syntactic rules to ensure validity and avoid conflicts with reserved keywords; for instance, they typically begin with a letter or underscore, followed by letters, digits, or permitted special characters like the dollar sign, while being case-sensitive in most modern languages. In languages like C and Java, identifiers cannot start with a digit and are limited in length, whereas JavaScript allows Unicode letters for broader international support. By some analyses, identifiers comprise nearly three-quarters of source code volume, underscoring their centrality to program structure, readability, and semantic meaning. Beyond programming, the concept extends to information systems and , where an identifier is any unique alphanumeric string, number, or that distinguishes an item, , or digital object in a given , such as persistent identifiers for scholarly resources or unique IDs in . In and contexts, identifiers represent unique like names or card numbers tied to a person's attributes, facilitating and . This versatility makes identifiers foundational across domains, from to standards and networked systems.

Core Concepts

Definition and Purpose

An is a name, , or code that refers to a specific , , or , enabling its distinction from others within a given . In , it typically takes the form of a unique alphanumeric string, numeric value, or that associates with the entity in a particular context, serving as a label for or . This foundational role allows identifiers to function across diverse domains, from physical artifacts to abstract ideas, by providing a consistent point of reference. The historical origins of identifiers trace back to early cataloging systems in the , which aimed to organize growing collections of knowledge systematically. A key precursor to modern identifiers is the (DDC) system, developed by in 1876 as a hierarchical method for classifying books in libraries using numeric codes based on subject matter. These early systems evolved from manual indexing practices in archives and libraries, laying the groundwork for structured naming that could scale with information volume, influencing later developments in and digital organization. The primary purposes of identifiers include facilitating reference, retrieval, and disambiguation in information systems, ensuring that entities can be located and differentiated efficiently. In everyday language, identifiers manifest as simple naming conventions, such as personal names or common nouns, which provide informal reference within social contexts. In formal systems, they enable precise retrieval by linking to metadata records, enhancing search precision and recall, while disambiguating similar entities—such as distinguishing between homonyms—to avoid confusion in large datasets. Key characteristics of identifiers include their design to be human-readable for intuitive use, machine-processable for automated handling, persistent to maintain stability over time where required, and context-dependent to operate effectively within specific scopes. Human-readability often involves alphanumeric formats that convey meaning, while machine-processability relies on standardized structures like strings or codes for computational efficiency. Persistence ensures long-term resolvability, particularly for digital objects, preventing obsolescence in evolving systems. Context-dependency means an identifier's uniqueness and applicability are bounded by its defined namespace or environment, adapting to the needs of the system it serves.

Types and Characteristics

Identifiers are classified primarily by their scope of uniqueness, distinguishing between local and global types. Local identifiers are unique only within a defined context or scope, such as a specific , , or subsystem, allowing reuse across different contexts without collision. For example, a like "item1" might identify an within one report but could be reused in another without ambiguity. In contrast, global identifiers ensure uniqueness across broader or entire systems, facilitating and tracking on a large scale; the Book Number (), a 13-digit code assigned to , exemplifies this by uniquely identifying publications worldwide regardless of publisher or region. Structurally, identifiers vary in composition to suit different needs for representation and processing. Alphanumeric identifiers combine letters and numbers, such as "user123," offering flexibility for human-readable yet compact forms in user accounts or product codes. Numeric identifiers use solely digits, like the integer , which are efficient for computational storage and comparison but less descriptive. Symbolic identifiers, such as Universally Unique Identifiers (UUIDs), employ standardized formats like 128-bit strings (e.g., "123e4567-e89b-12d3-a456-426614174000") to generate opaque, collision-resistant labels without relying on central authority. Composite identifiers build hierarchically from multiple components, as seen in domain names like "," where subdomains nest within top-level domains to organize namespaces. Essential properties of identifiers influence their effectiveness in identification tasks. refers to how easily humans can interpret and use the identifier, favoring meaningful or pronounceable forms over random strings to reduce errors in manual entry. Brevity ensures shortness to minimize transcription mistakes and storage overhead, with optimal lengths balancing uniqueness against usability—typically 8-20 characters for many applications. involves standardized formats and conventions across uses, enabling predictable parsing and validation. Mutability addresses whether the identifier can change over time; while some local identifiers may be mutable for flexibility, global ones are generally immutable to maintain persistence and . The evolution of identifiers reflects advancing needs for organization and automation. In ancient record-keeping, such as the Inca khipu system of knotted strings from the , simple symbolic labels encoded administrative data like inventories through knot positions and colors, serving as early non-written identifiers. This progressed to printed labels in the with , but a major leap occurred in the mid-20th century with standardized machine-readable formats; barcodes, patented in 1952 and first scanned commercially in 1974, introduced linear patterns like the Universal Product Code (UPC) for rapid, error-free in . Different structural types can contribute to namespace conflicts when scopes overlap, as explored in later sections.

Computing Applications

In Programming Languages

In programming languages, identifiers serve as names for entities such as variables, functions, and classes, adhering to specific syntax rules to ensure parseability and consistency. Typically, an identifier begins with a or (classified as an ID_Start character per standards), followed by zero or more alphanumeric characters, underscores, or other ID_Continue characters like combining marks, but excluding reserved keywords and spaces. For instance, in , identifiers must start with a (a-z, A-Z, or Unicode equivalents) or , followed by letters, digits (0-9), or underscores, with no length limit, but cannot match reserved keywords such as "if" or "class". Similarly, in C, identifiers start with a or , followed by letters, digits, or underscores, with implementations required to treat at least the first 31 characters as significant for internal identifiers and 6 for external ones in older standards, though modern compilers often support longer names. In , identifiers follow a comparable pattern, starting with a Unicode , $, or _, followed by letters or digits, with no length restriction and distinguishing names like "myVar" from "MyVar". Scoping mechanisms determine the visibility and lifetime of identifiers, primarily through lexical (static) scoping in most modern languages, where is resolved based on the code's textual structure rather than runtime . Local identifiers, such as those declared within a or , are accessible only within that enclosing ; for example, in , variables declared in a or have block-level , ceasing to exist after the block ends, promoting encapsulation and preventing unintended side effects. identifiers, conversely, are visible across a broader context, like module-wide in , where they reside in the module's and can be accessed or modified using the "global" keyword, though employs lexical scoping to resolve names by searching enclosing , then the module, and finally built-ins. This lexical approach, exemplified in both languages, ensures predictable name resolution, as the of an identifier like a nested 's is determined by its position in the source code. Identifiers play a crucial role in structuring code by naming variables, functions, and classes, directly influencing readability and maintainability through conventions that enhance clarity. Case sensitivity is standard in languages like Python, C, and Java, allowing distinct names such as "userName" and "username", which supports expressive naming but requires careful attention to avoid errors. Common conventions include camelCase (e.g., "myVariable" in Java for variables) and snake_case (e.g., "my_variable" in Python), which separate words to improve human readability without compromising machine parsing, as these styles align with language-specific guidelines to foster consistent, self-documenting code. Historically, identifier rules evolved from hardware constraints to greater flexibility, reflecting advancements in compiler technology and usability. The original FORTRAN I, released in 1957, limited identifiers to six alphanumeric characters starting with a letter, a constraint derived from IBM 704's 6-bit character encoding to simplify symbol table management in early compilers. Subsequent languages like C retained partial echoes of this with initial significant character limits (e.g., 6 for external identifiers pre-C99), but modern ones such as JavaScript impose no length restrictions, allowing arbitrary-length identifiers starting with letters or underscores to support more descriptive naming and Unicode integration. This progression from Fortran's rigid six-character cap to flexible rules in contemporary languages underscores a shift toward prioritizing developer productivity and code expressiveness.

In Databases and Systems

In relational databases, identifiers play a central role in maintaining and enabling relationships between s. A is a column or set of columns that uniquely identifies each row in a , enforcing by ensuring no duplicate or values exist in that column. For example, an auto-incrementing integer column, such as id INT AUTO_INCREMENT [PRIMARY KEY](/page/Primary_key) in SQL, automatically generates sequential unique values for new rows. A , conversely, is a column or set of columns in one that references the in another , establishing to prevent orphaned records and ensure valid relationships. For instance, a customer_id foreign key in an orders links to the of a customers . These concepts were formalized in the ANSI SQL standards starting with SQL-89 in 1989, which introduced primary key constraints for unique row identification, and SQL-92, which added foreign keys and referential constraints to enforce data integrity across tables. At the system level, identifiers facilitate resource management in operating systems and applications. In Unix-like systems, a process ID (PID) is a unique integer assigned sequentially to each running process, serving as its identifier for scheduling, monitoring, and termination. File handles act as opaque integer references provided by the operating system to open files, allowing processes to read, write, or manipulate them without exposing underlying storage details. Session tokens, often implemented as unique strings or IDs, maintain state for user interactions in web or distributed systems, binding requests to authenticated sessions without requiring constant database lookups. Identifiers are essential in querying and indexing for efficient data retrieval. In SQL, they appear in statements like SELECT * FROM users WHERE id = 5, where the id primary key filters rows rapidly. Primary keys automatically create clustered indexes in many systems, organizing data physically for faster lookups and joins, while foreign keys benefit from non-clustered indexes to optimize relationship queries. This indexing role underscores the surrogate versus natural keys debate: natural keys derive from business data (e.g., email addresses), but surrogate keys like UUIDs—128-bit globally unique identifiers—are preferred in distributed systems to avoid central coordination and collision risks during data replication across nodes. For example, UUIDs generated via functions like gen_random_uuid() ensure scalability in multi-node environments without sequential ID conflicts.

Distinctions and Challenges

IDs versus UIDs

In computing, an identifier (ID) serves as a descriptive label for an entity, which may or may not be unique within its context, such as a name like "John" assigned to multiple individuals in a contact list. In contrast, a unique identifier (UID) is a numeric or alphanumeric string guaranteed to distinguish a single entity across a defined domain, exemplified by a Social Security Number that uniquely identifies an individual within the U.S. system. The primary differences between IDs and UIDs lie in their of , methods, and associated collision risks. IDs often operate within a local , ensuring only in limited contexts like a specific or block, whereas UIDs aim for global or domain-wide , potentially across infinite or distributed systems. for IDs typically involves simple sequential methods, such as auto-incrementing integers, while UIDs employ more robust techniques like UUIDs, which combine timestamps, random values, or hashing to minimize predictability. Collision risks are higher for IDs due to their potential reusability or duplication in shared spaces, but UIDs are designed with probabilistic or deterministic guarantees to avoid overlaps, though not entirely risk-free in vast scales. Practical examples illustrate these distinctions: in spreadsheets, row numbers function as non-unique IDs within a single sheet but may overlap across workbooks, allowing easy local referencing without global enforcement. Conversely, MAC addresses serve as UIDs, providing 48-bit hardware-based uniqueness for network interfaces worldwide, assigned by manufacturers under IEEE standards to prevent conflicts in Ethernet communications. While UIDs effectively prevent duplicates in large-scale or distributed environments, they introduce trade-offs such as increased complexity in implementation and higher storage overhead—for instance, a 128-bit UUID requires more space than a ID, potentially impacting efficiency and query performance. Non-unique IDs, by avoiding such overhead, simplify local operations but can contribute to issues when scaled.

Namespace Conflicts and Resolution

Namespace conflicts arise when identifiers with the same name exist in overlapping or shared contexts, leading to ambiguities in resolution. Implicit conflicts often occur due to the same identifier being defined in different modules or scopes that are later combined, such as a variable named x declared locally and globally in C++, where the local shadows the global unless explicitly qualified. Explicit conflicts emerge from overlaps in distributed environments, like domain name collisions where an internal private namespace (e.g., .internal) inadvertently resolves to a public top-level domain after its delegation, potentially exposing sensitive systems. Detection of these conflicts varies by system type and phase. In compiled languages like C++ and C#, compile-time checks identify ambiguities, producing errors such as "conflicting declaration" when identical identifiers appear in the same scope. In dynamic languages like , conflicts in the module ecosystem—such as one module overwriting another's —are often detected at or through tools like ModuleGuard, which simulates environments to reveal issues like module-to-third-party-library overlaps affecting over 21% of PyPI packages. In distributed systems, resolution relies on scoping mechanisms; for instance, enforces uniqueness within namespaces during resource creation, preventing conflicts proactively, though misconfigurations can lead to DNS resolution failures. Resolution strategies focus on disambiguation and isolation. Namespaces partition identifiers into distinct domains, as in packages, where classes like com.example.Class avoid clashes by organizing code hierarchically based on reversed domain names. Qualification uses fully specified paths, such as C#'s global::N1.N2.A or the :: in C++ to access specific instances like ::x for globals. Aliasing provides temporary renamings, seen in C# with using A = N1.N2.A; for shorthand access or in SQL's AS clause (e.g., SELECT e.name AS employee_name FROM employees e), which resolves column ambiguities during joins from multiple tables. Case studies illustrate these issues in practice. In the ecosystem, a 2024 study analysis of 4.2 million PyPI packages (434,823 latest versions as of April 2023) revealed that 21.45% exhibit module-to-third-party-library conflicts. Among 97 collected issues from the study, 65.98% were module-to-TPL conflicts, often involving third-party libraries defining modules that overlap with ones, leading to errors; tools like ModuleGuard detected conflicts in 108 projects (65 in latest versions), highlighting the need for environment-aware resolution. In modern architectures, namespaces mitigate conflicts by isolating resources—e.g., allowing duplicate service names like payment in dev and prod namespaces—using DNS FQDNs (e.g., payment.dev.svc.cluster.local) for runtime communication, though overlapping deployments without proper scoping can cause in collaborative environments. Legacy systems, particularly during 1990s integrations, faced similar challenges when merging disparate codebases, often requiring manual renaming or wrappers to handle identifier overlaps in or mainframe environments.

Interdisciplinary Uses

In Biology and Medicine

In biology and medicine, identifiers play a crucial role in standardizing the cataloging of genetic material, organisms, and clinical data, enabling precise communication and interoperability across research and healthcare systems. Genetic identifiers, such as gene symbols approved by the (HGNC), provide concise, unique labels for human s based on their function or discovery context; for instance, the symbol denotes the breast cancer 1 , following guidelines established by the HGNC since its founding in 1979 to promote consistency amid rapid genomic discoveries. Complementing these, accession numbers from the National Center for Biotechnology Information's (NCBI) database serve as stable, unique identifiers for sequences, such as "NM_007294.4" for a specific transcript, facilitating global access and versioning of genetic data submissions. These systems ensure that biological entities are distinctly referenced, akin to unique identifiers in broader contexts, to avoid ambiguity in and databases. Medical identifiers extend this precision to clinical applications, with the (ICD) codes standardizing diagnoses worldwide; , adopted in 2019, uses alphanumeric codes like "2C61" for to support epidemiological tracking, , and . Similarly, (—Clinical Terms) provides comprehensive codes for clinical concepts, such as "22298006" for , enabling detailed documentation and across healthcare providers. Standards bodies like the , which oversees HGNC, and WHO drive these efforts by coordinating international consensus on , ensuring identifiers remain authoritative and adaptable to evolving knowledge. Challenges in these domains often arise from versioning, as new discoveries necessitate updates to identifiers without disrupting established references; for example, HGNC may revise a post-discovery if functional insights reveal misleading prior naming, though such changes are minimized to maintain stability. In applications, identifiers like Ensembl stable IDs (e.g., "ENSG00000012048" for ) support cross-species comparisons by linking homologous genes across organisms in databases, aiding evolutionary studies and functional annotation transfer. These tools collectively underpin advancements in and biodiversity research by providing robust, traceable references for biological and clinical entities.

In Mathematics and Logic

In mathematics and logic, identifiers serve as symbolic representations of abstract entities, enabling precise expression and manipulation within formal systems. Variables, such as x in the function f(x) = x^2, denote unspecified quantities that can take on values from a domain, facilitating algebraic equations and calculus operations. This notation traces back to François Viète's 1591 work, where vowels like A, E, I represented unknowns, while consonants denoted known quantities, establishing a systematic algebraic language. René Descartes further standardized the use of letters at the end of the alphabet (x, y, z) for variables and those at the beginning (a, b, c) for parameters or constants in his 1637 La Géométrie. Constants, like \pi approximating the circle's circumference-to-diameter ratio, identify fixed values; the symbol \pi was introduced by William Jones in 1706 and popularized by Leonhard Euler in 1737. Gottfried Wilhelm Leibniz, in the late , advanced notation standards in by employing letters like x and y for variables representing changing quantities (fluents) and distinguishing them from constants, terms he coined alongside "" to describe relations between variables. His differential notation, such as dx and dy, treated variables as identifiers for changes, laying groundwork for modern . In logic, identifiers include propositional symbols like P and Q, which stand for atomic statements in expressions such as P \land Q () within propositional logic. These uppercase letters, used as propositional variables, were standardized by in his 1903 The Principles of Mathematics. Predicate logic extends this with bound variables, as in \forall x \, P(x) (universal quantifier), where x is bound by \forall, restricting its scope to the formula's domain and eliminating free occurrences to ensure unambiguous truth evaluation. Formal systems employ for structural rigor; in , elements are labeled with like x \in S, identifying membership without inherent order. , developed by in the 1930s, uses variable binding via \lambda x . M, where x identifies the argument in functional , foundational for expressing computable functions and influencing . Conventions in and prioritize clarity, often using letters for specialized —such as \sigma for the operator \sum, introduced by Euler in 1755 to denote series totals concisely. To avoid ambiguity in proofs, must be distinctly scoped, with parentheses or quantifiers preventing variable capture, as overlapping uses could alter . In social and legal contexts, identifiers serve as essential tools for establishing and verifying individual and organizational identities, facilitating governance, commerce, and regulatory compliance. Personal identifiers, such as passports and national ID systems, provide unique markers for citizens to access services and prove citizenship or residency. For instance, 's system, launched in 2009 by the Unique Identification Authority of India (UIDAI), assigns a 12-digit unique number linked to biometric data like fingerprints and iris scans to more than 1.42 billion residents as of September 2025, enabling secure authentication for welfare benefits and . Similarly, the Union's (GDPR), effective since May 25, 2018, treats personal identifiers—including names, ID numbers, and location data—as "personal data" requiring explicit consent for processing to safeguard and prevent misuse. Organizational identifiers, such as registry numbers, ensure accountability in economic activities by uniquely tagging entities for taxation and legal recognition. In the United States, the Employer Identification Number (EIN), issued by the (IRS), is a nine-digit code used to identify businesses, sole proprietors, and other entities for federal tax purposes, including hiring employees and filing returns. Trademarks function as branded identifiers, legally protecting distinctive symbols, words, or designs that distinguish goods or services from competitors, thereby preventing consumer confusion and supporting brand integrity under frameworks like the U.S. . Legal frameworks standardize identifiers to promote and security across borders while addressing risks like pseudonymity and . The (ISO) maintains , an international standard since 1974 that defines two- and three-letter codes for countries (e.g., "" for ), used globally in passports, trade documents, and digital systems to ensure consistent national identification. Pseudonymity, where individuals use aliases instead of real names, is supported in privacy laws like GDPR to balance anonymity with accountability, allowing data processing without revealing full identities when re-identification risks are minimized. To combat —the unauthorized use of personal identifiers for fraud—regulations such as the U.S. Federal Trade Commission's , implemented in 2009, require financial institutions and creditors to develop programs detecting patterns of suspicious activity, like mismatched addresses, to prevent and mitigate harm. Historically, identifiers in social and legal systems evolved from rudimentary naming conventions to sophisticated digital tools integral to . In , censuses conducted under emperors like (e.g., the 28 BCE census) relied on personal names—typically a (), (), and sometimes ()—declared alongside property and tribal affiliations to tally citizens, assess taxes, and maintain social order, as recorded in official declarations before censors. This practice laid foundational principles for that persisted through medieval registries into modern , where digital IDs like Estonia's e-ID system, introduced in 2002, enable secure online voting, tax filing, and service access for over 99% of public interactions, marking a shift from paper-based to blockchain-secured identifiers.

References

  1. [1]
    Identifier - Glossary - MDN Web Docs
    Jul 11, 2025 · In most languages, identifiers are case-sensitive and not quoted. In JavaScript, identifiers can contain Unicode letters, $ , _ , and digits (0 ...
  2. [2]
    Syntax - Computer Science
    An identifier is the computer science word for a name you attach to an entity (a variable, constant, function, type, parameter, or similar thing). A keyword is ...
  3. [3]
    UTS #31: Identifier and Pattern Syntax - Unicode
    Each programming language standard has its own identifier syntax; different programming languages have different conventions for the use of certain ...
  4. [4]
    4.3: Identifier Names - Engineering LibreTexts
    May 3, 2025 · A valid identifier must begin with a non-digit character. Identifiers are case-sensitive (lowercase and uppercase letters are distinct), and ...
  5. [5]
    Identifiers in C - GeeksforGeeks
    Sep 18, 2025 · Rules for Naming Identifiers in C · The first character of an identifier must be a letter or an underscore. · Identifiers are case-sensitive.
  6. [6]
    [PDF] Quantifying Identifier Quality: An Analysis of Trends
    Abstract Identifiers, which represent the defined concepts in a program, account for, by some measures, almost three quarters of source code.
  7. [7]
    Identifier — University Libraries - UNT
    Identifier Definition: A numeric or alphanumeric string or a URL that identifies the item in a particular context.
  8. [8]
    Identifiers for the 21st century: How to design, provision, and reuse ...
    An identifier is a sequence of characters that identifies an entity. The term “ persistent identifier ” is usually used in the context of digital objects that ...
  9. [9]
    identifier - Glossary - NIST Computer Security Resource Center
    Definitions: Unique data used to represent a person's identity and associated attributes. A name or a card number are examples of identifiers.
  10. [10]
    Identifier Definition | GIS Dictionary - Esri Support
    [information systems] A unique character string or numeric value associated with a particular object. See also. GlobalID · globally unique identifier.
  11. [11]
    [PDF] Introduction to the Dewey Decimal Classification - OCLC
    Sep 29, 2025 · The DDC Summaries, the top three levels of the Dewey Decimal Classification system, have been translated ... historical periods, national origin) ...
  12. [12]
    Major Library Classification Systems: Evolution and Importance
    Mar 5, 2024 · This led to the creation of the Dewey Decimal Classification (DDC) system in 1876 by Melvil Dewey, a revolutionary development in organizing ...Missing: identifiers cataloging
  13. [13]
    History of the Dewey Program at the Library of Congress
    The Library of Congress (LC) has been the biggest single contributor of Dewey Decimal Classification (DDC) numbers for American libraries since 1930.
  14. [14]
    Metadata for Name Disambiguation and Collocation - MDPI
    Uniform resource identifiers will point to discrete name metadata records and will increase search precision and recall on the Internet and in online databases.<|separator|>
  15. [15]
    The Basics - Persistent Identifiers - NOAA Library
    Mar 28, 2025 · Persistent Identifiers (PIDs) are globally unique, persistent, interoperable, and machine-readable/resolvable identifiers used to disambiguate entities.
  16. [16]
    Exploring Research Transformation through the lens of Persistent ...
    Jun 26, 2024 · Persistent identifiers (PIDs) refer to the same digital object over time, acting as a bridge between knowledge sets and a link to find digital ...
  17. [17]
    Human-readable and machine-readable Persistent Identifiers
    May 27, 2015 · This is an important paper trying to address a fundamental problem: how can we make persistent identifiers both human-readable and machine-readable?Missing: processable context- dependent
  18. [18]
    Persistent identifiers - Digital Preservation Handbook
    A persistent identifier is a long-lasting reference to a digital resource. Typically it has two components: a unique identifier; and a service that locates the ...
  19. [19]
    Desirable Characteristics of Persistent Identifiers - Upstream
    Mar 19, 2024 · Findability: PIDs inherently excel in making digital objects findable. Each PID is unique and persistent, offering a stable reference point ...Missing: dependent | Show results with:dependent
  20. [20]
    Analysis of identifiers in IoT platforms - ScienceDirect.com
    There are two types of identifiers: globally unique identifiers and locally unique identifiers. Globally unique identifiers require a strong IS. Locally ...
  21. [21]
    What is an ISBN? | International ISBN Agency
    An ISBN is essentially a product identifier used by publishers, booksellers, libraries, internet retailers and other supply chain participants for ordering, ...
  22. [22]
    Universally Unique IDentifiers (UUID) - IETF
    Jun 9, 2023 · UUIDs are also known as GUIDs (Globally Unique IDentifiers). A UUID is 128 bits long and is intended to guarantee uniqueness across space and time.
  23. [23]
    Khipu Archives: Duplicate Accounts and Identity Labels in the Inka ...
    The presence of duplicate accounts implies a bookkeeping methodology similar to ancient Mesopotamian practices, highlighting Inka administrative sophistication.<|separator|>
  24. [24]
    The History of the Bar Code - Smithsonian Magazine
    Sep 23, 2015 · Inventor Joe Woodland drew the first bar code in sand in Miami Beach, decades before technology could bring his vision to life.
  25. [25]
    UAX #31: Unicode Identifiers and Syntax
    These guidelines follow the typical pattern of identifier syntax rules in common programming languages, by defining an ID_Start class and an ID_Continue ...
  26. [26]
    2. Lexical analysis
    ### Rules for Identifiers in Python
  27. [27]
    Chapter 3. Lexical Structure
    ### Summary of Rules for Identifiers in Java (Section 3.8)
  28. [28]
  29. [29]
    9. Classes
    ### Summary of Scoping in Python, Local and Global Variables, Lexical Scoping
  30. [30]
    PEP 8 – Style Guide for Python Code | peps.python.org
    Apr 4, 2025 · The first word should be capitalized, unless it is an identifier that begins with a lower case letter (never alter the case of identifiers!).PEP 20 – The Zen of Python · PEP 257 · PEP 7 – Style Guide for C Code
  31. [31]
    [PDF] Programmer's Primer for FORTRAN Automatic Coding System
    As in the case of fixed point input, there is a limit of ten digits per field; the maximum number of digits for the number is therefore eight, two digits being ...
  32. [32]
    Primary and foreign key constraints - SQL Server - Microsoft Learn
    Feb 4, 2025 · Primary keys and foreign keys are two types of constraints that can be used to enforce data integrity in SQL Server tables.
  33. [33]
    What is a foreign key? (with SQL examples) - CockroachDB
    May 4, 2023 · Primary keys serve as unique identifiers for each row in a database table. Foreign keys link data in one table to the data in another table. A ...
  34. [34]
    What is ANSI SQL and why it matters - CelerData
    Aug 1, 2024 · employee_id INT PRIMARY KEY : Defines a column for the employee's unique identifier, marked as the primary key. first_name VARCHAR(50) NOT ...
  35. [35]
    The Evolution of SQL: From SQL-86 to SQL-2023 - Coginiti
    Jan 18, 2024 · SQL-89 focused particularly on primary key constraints, which ensure that each row in a table is uniquely identified by its values in ...
  36. [36]
    Linux / UNIX Find out or determine if process PID is running - nixCraft
    Aug 14, 2023 · A PID is an acronym for process identification number on a Linux or Unix-like operating system. A PID is automatically assigned to each process ...
  37. [37]
    What is a File Handle and How Does it Work in Programming?
    A file handle is like a key to a file, allowing you to interact with it in the digital realm. When you open a file, the operating system assigns a handle.
  38. [38]
    Session Management - OWASP Cheat Sheet Series
    The session ID or token binds the user authentication credentials (in the form of a user session) to the user HTTP traffic and the appropriate access controls ...<|separator|>
  39. [39]
    Indexing Essentials in SQL - Atlassian
    Dec 9, 2019 · Indexing makes columns faster to query by creating pointers to where data is stored within a database.
  40. [40]
    Natural versus Surrogate Primary Keys in a Distributed SQL Database
    Feb 18, 2020 · What are surrogate primary keys · Every table must have a defined primary key constraint. · Every table must have at least one business unique key ...
  41. [41]
    What are unique and non-unique identifiers?
    Aug 20, 2024 · A non-unique identifier can be assigned to more than one instrument in any scope at a time. For example, you could assign the ISIN non-unique ...
  42. [42]
    What is a unique identifier (UID)? | Definition from TechTarget
    Sep 4, 2024 · A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  43. [43]
    Auto-generated primary keys: UUID, serial or identity column?
    Numbers generated by a sequence and UUID s are both useful as auto-generated primary keys. Use identity columns unless you need to generate primary keys outside ...<|separator|>
  44. [44]
    The Benefits of Using UUIDs for Unique Identification - TiDB
    Jul 17, 2024 · Unlike sequential IDs, which can be easily enumerated, UUIDs are complex and non-sequential, reducing the risk of enumeration attacks.
  45. [45]
    Choosing the Right UUID Type for Database Keys - TiDB
    Aug 29, 2024 · It's essential to weigh the trade-offs, such as storage overhead and potential index fragmentation, against your specific use cases. Consider ...
  46. [46]
    How to Resolve a Name Conflict in C++? - GeeksforGeeks
    Jul 23, 2025 · In this article, we will discuss what are name conflicts, what are its causes, and how to resolve the name conflict in C++.
  47. [47]
    Understanding And Preventing Namespace Collisions
    Dec 17, 2024 · Namespace collision occurs when an internal domain name is resolved to an external one, like a top-level domain (TLD), due to new TLDs.What Is a Namespace Collision? · Preventing and Mitigating...
  48. [48]
    Namespaces - C# language specification - Microsoft Learn
    Sep 12, 2025 · In this situation, the conflict can be resolved either through qualification of references to A , or by introducing a using_alias_directive that ...Missing: strategies | Show results with:strategies
  49. [49]
    Namespaces
    ### Summary: How Kubernetes Namespaces Resolve Naming Conflicts in Microservices and Distributed Systems
  50. [50]
  51. [51]
    SQL Alias: Everything You Need to Know About AS in SQL
    Rating 4.6 (146) · $0.00 to $229.00 · DeveloperAliases are generally used to make the column and table names more readable or concise, or to resolve naming conflicts when combining multiple tables. The SQL ...
  52. [52]
    The 'Y2K' danger isn't over: why the danger from legacy systems is real
    Dec 1, 2015 · Legacy software systems are facing imminent danger of a major security breach and loss of data if they're not updated…and soon. Financial ...
  53. [53]
    [PDF] Guidelines for Human Gene Nomenclature (1997)
    In recognition of the importance of the gene nomenclature burgeoning volumes of sequence data for mouse and human. These scientists are looking for assistance ...Missing: BRCA1 | Show results with:BRCA1
  54. [54]
  55. [55]
    Sequence Identifiers - NCBI - NIH
    Nov 9, 2017 · Many sequences have two types of identification numbers, GI and VERSION. The two identifier types differ in format, and were implemented at different times.Genbank · Sequence Identifiers · Sequence Versions
  56. [56]
    GenBank Overview - NCBI
    Dec 8, 2022 · GenBank is the NIH genetic sequence database, an annotated collection of all publicly available DNA sequences.Sequence Identifiers · How to submit data · Sample GenBank Record · About TSA
  57. [57]
    WHO's new International Classification of Diseases (ICD-11) comes ...
    Feb 11, 2022 · ICD-11 was adopted at the World Health Assembly in May 2019 and Member States committed to start using it for mortality and morbidity reporting ...
  58. [58]
    International Classification of Diseases (ICD)
    ICD-11 enables, for the first time, the counting of traditional medicine services and encounters; the measurement of their form, frequency, effectiveness, ...WHO releases 2025 update to... · ICD-11 2024 release · ICD-11 Fact Sheet
  59. [59]
    The importance of being the HGNC - PMC - NIH
    Nov 15, 2022 · Gene symbol choice can sometimes have unexpected consequences. The HGNC recently updated the symbols of 27 genes that were being auto ...
  60. [60]
    Ensembl genome browser 115
    Compare genes across species · Find SNPs and other variants for my gene · Gene expression in different tissues · Retrieve gene sequence · Use my own data in Ensembl.Human · Mouse · Ensembl Tools · Species List
  61. [61]
    Comparative Genomics - Ensembl
    Ensembl Compara provides cross-species resources and analyses, at both the sequence level and the gene level. These data can be accessed in various ways.
  62. [62]
    Earliest Uses of Symbols for Variables - MacTutor
    In 1591 Francois Viete (1540-1603) was the first person to use letters for unknowns and constants in algebraic equations.
  63. [63]
    [PDF] A History of Mathematical Notations, 2 Vols - Monoskop
    PREFACE. The study of the history of mathematical notations was sug- gested to me by Professor E. H. Moore, of the University of Chicago.
  64. [64]
    A history of Pi - MacTutor - University of St Andrews
    The first to use π with its present meaning was an Welsh mathematician William Jones in 1706 when he states "3.14159 etc. = π". Euler adopted the symbol in 1737 ...
  65. [65]
    Earliest Uses of Some Words of Mathematics - MacTutor
    Gottfried Wilhelm Leibniz, who introduced the words variable, constant, function, abscissa, parameter, and coordinate;
  66. [66]
    Earliest Uses of Symbols of Set Theory and Logic - MacTutor
    Klement. p, q, and r were used as propositional letters by Bertrand Russell in 1903 in The Principles of Mathematics (OED). ~p for "the negation of p" appears ...
  67. [67]
    Alonzo Church > D. The λ-Calculus and Type Theory (Stanford ...
    The λ-operator is a monadic variable binding “abstraction” operator that allows one to build complex expressions that designate functions.
  68. [68]
    Summation notation
    Leonhard Euler introduced the notation Sigma for summation in 1755 (he also introduced e for the base of the natural logarithm, pi for the ratio of the ...
  69. [69]
    Unique Identification Authority of India | Government of India - uidai
    The UIDAI is a statutory authority established under the provisions of the Aadhaar Act, 2016 on 12 July 2016 by the Government of India.Composition of UIDAI Authority · Vision & Mission · Finance & Accounts
  70. [70]
    General Data Protection Regulation (GDPR) – Legal Text
    The European Data Protection Regulation is applicable as of May 25th, 2018 in all member states to harmonize data privacy laws across Europe.Art. 28 Processor · Recitals · Personal Data · Chapter 4Missing: identifiers | Show results with:identifiers
  71. [71]
    [PDF] Understanding Your EIN - IRS
    The IRS uses the number to identify taxpayers that are required to file various business tax returns. EINs are used by employers, sole proprietors, corporations ...
  72. [72]
    What is a trademark? - USPTO
    Mar 31, 2021 · A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.
  73. [73]
    ISO 3166 — Country Codes
    ISO 3166 is an international standard which defines codes representing names of countries and their subdivisions. The standard specifies basic guidelines for ...Country Codes Collection · Glossary for ISO 3166 · ISO 3166-1:2020 · ISO/TC 46
  74. [74]
    Art. 4 GDPR – Definitions - General Data Protection Regulation ...
    Rating 4.6 (10,110) 'personal data' means any information relating to an identified or identifiable natural person ('data subject'); an identifiable natural person is one who can ...Missing: date | Show results with:date<|separator|>
  75. [75]
    Fighting Identity Theft with the Red Flags Rule: A How-To Guide for ...
    May 2, 2013 · The Red Flags Rule tells you how to develop, implement, and administer an identity theft prevention program.
  76. [76]
    Roman Personal Nomenclature
    At least two names were necessary for Roman men, the praenomen (first name, given name) and nomen (principal name, gens name). The nomen usually ended in -ius.