Display the semantic errors in the compilation listing

Assignment Help Computer Engineering
Reference no: EM13189201

The third project involves writing the semantic analyzer for the compiler that was begun in the previous projects. To simplify the semantic error checking, you are to remove the ability to have multiple functions from the grammar and the ability to make function calls.

In order to perform semantic analysis, the symbol table must be completed in this project. The 70 points that you will receive for the functionality portion of your grade on this project will be based on how many of the following errors that you can detect:

Using Boolean Expression with Arithmetic Operator 5 points
Using Boolean Expression with Relational Operator 5 points
Using Arithmetic Expression with Logical Operator 10 points
Conditional Expression Type Mismatch 5 points
If Condition Not Boolean 5 points
Narrowing Variable Initialization 5 points
Variable Initialization Mismatch 5 points
Undeclared Variable 10 points
Duplicate Variable 10 points
Narrowing Function Return 10 points

Test data that contains each of the following errors will be provided.

This project requires modification to the bison input file, so that it defines the semantic checks necessary to produce these errors and the inclusion of a symbol table to keep track of the declared identifiers.

Variables and parameter names have local scope. The scope rules require that all names be declared and prohibit duplicate names within the same scope. The type correspondence rules are as follows:

  • Boolean operators cannot be used with arithmetic or relational operators.
  • Arithmetic expressions cannot be used with logical operators.
  • The two expressions in a conditional expression must match in type. No coercion is performed.
  • The type of the if condition must be Boolean.
  • A narrowing variable initialization or function return occurs when a real value is being forced into integer. Widening is permitted.
  • Boolean types cannot be mixed with numeric types in variable initializations or function returns.
  • Type coercion from an integer to a real type is performed within arithmetic expressions.

Like syntax errors, the compiler should display the semantic errors in the compilation listing, after the line in which they occur.

Reference no: EM13189201

Questions Cloud

Levels of protection-functionality and limitations : Explain a Class Three ensemble. Include levels of protection, functionality, and limitations. Identify the proper respiratory protection for a Class Three ensemble,
What is the expected monetary value with the survey : A market research is available for $10,000. Using a decison tree analysis, it is found that the expecyed monetary value with no survey is $75,000. If the expected value of sample information is 62,000, what is the expected monetary value with the ..
What is the size of the labor force : Suppose the number of employed people in an economy is 121,166,640. The unemployment rate in this economy is 10.4 percent, or .104, and the labor force participation rate is 72.5 percent, or .725. a. What is the size of the labor force
Find the dimensions of the plot : A farmer wants to set aside a rectangular plot of land to contain 160 square meters. If the width is 19 less than the length, find the dimensions of the plot.
Display the semantic errors in the compilation listing : Variables and parameter names have local scope. The scope rules require that all names be declared and prohibit duplicate names within the same scope
What is the public budget deficit : In a closed economy the following holds: Household consumption C is given by the consumption function: C = 100 + 0.75Yd Planned investments are I = 250 (independent of Y ). Household disposable income: Yd = Y - T, where Y is production. Taxes depend ..
Decontamination process : Describe the four stages of decontamination and their importance in the decontamination process. Explain at least two initial decontamination considerations, and why and when these considerations are important. Support your analysis with appropriate ..
How many disserent sundaes are possible : Sam can chose among 3 flavors of ice cream, 2 toppings and 3 types of candy for his ice cream sundae. How many disserent sundaes are possible?
What will the radius of this larger sphere be : A jeweler has three small solid spheres made of silver, of radius 2 mm, 6 mm, and 6 mm. He decides to melt these down and make just one sphere out of them. What will the radius of this larger sphere be?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd