Browse Definitions :
Reference

ADA Cheat Sheets

 

We've gathered cheat sheets for fast reference to information about the ADA programming language. You'll find information about declarations, expressions, translation to other languages, the library and more. Do you have a favorite ADA cheat sheet? Let us know!

Need more background information before you get started? See our definitions for ADA, structured programming and Object-oriented programming (OOP).

 

  • Ada Reference Card -- This multipage PDF cheat sheet lists attributes, pragmas and the standard library.

  • ADA Syntax Reference Card -- This reference lists syntax for the library, declarations, expressions, .

  • ADA Cheat Sheet -- This ezUnix fast reference provides a list of some quick ADA-specific options.

  • Learning ADA -- This guide answers frequently asked questions about learning ADA.

  • Education Materials for ADA -- This reference provides links and information for further resources to learn about ADA, including free tutorials.

  • Translating C++ to ADA 95 -- This article describes a case study in which such a translation was performed manually. The difficulties encountered are described, as well as the solutions that were adopted. See also: a justification for an automatic translator from C++ to Ada 95.

We've got lots more!

Check out the full collection of Our Favorite Cheat Sheets for fast help on a wide range of subjects. You'll find cheat sheets for Windows and Linux, as well as information about e-mail and messaging, texting and Twitter abbreviations and a wide range of technical content, including subjects like programming, blogging, browser shortcuts, and search engine optimization.

For more in-depth information, see our our collection of learning guides. Then test your knowledge with all our quizzes.

This was last updated in May 2010

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Just so you know, the correct name for this programming language is "Ada". It is not capitalized as it is not an acronym.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close