Evolution of imperative programming languages

Assignment Help Basic Computer Science
Reference no: EM131061849

Question:

Question 1

(a) In the evolution of imperative programming languages, features have been introduced, whilst other features have been removed or deprecated in 'successor' languages.

Discuss, with critical comment, the motivations for these changes that have been made to imperative programming languages. Concentrate your discussion on issues of reliability and maintenance, both corrective and enhancement of applications that are developed in these languages.

In your discussion use a range of imperative programming languages (For example: COBOL, BCPL, C, C++, Java etc.) to illustrate points that you make. DO NOT consider any issues or constructs that directly or indirectly make use of concurrency.

(b) Discuss, using an appropriate notation, how it is possible to 'port' a compiler for a programming language to a new host machine which has a different architecture from its existing environment. The effort required to port the compiler should be considerably less that the effort required to create the original version of the compiler.

In your discussion of the process involved, describe carefully the overall structure of the compiler in relationship to the need to facilitate the 'port' of the compiler to a new machine.

Question 2:

(a) What is transactional memory? Discus, how transactional memory may be implicitly used in a Java program to improve performance in programs that consist of several concurrently executing threads that share access to common data structures.
Remember, the use of transactional memory will not require any changes to the physical source code of a program.

(b) Discuss, with critical comment, the extent to which the new features of Java 8 allow a programmer to construct a program that will make use of multiple cores without explicitly having to use threads in the solution. Use appropriate examples to illustrate the points that you make.

(c) In a computer game, a high priority thread is used to process user interactions  with the system. This high priority thread accesses a shared data structure (aSDS) which is also accessed by a low priority thread in the system. To prevent corruption of the data, a lock is used to prevent more than 1 concurrent access to the shared data structure (aSDS). The low priority thread continually checks the state of the game and performs low level housekeeping tasks including the re-organisation of the shared data structure (aSDS). The re-organisation of the shared data structure (aSDS) will occur every second, however, it will take under 5 CPU milliseconds to run.

The above system will always allow a higher priority thread to run even if it has to pre-empt a running lower priority thread. Recently a medium priority thread has been introduced that adds some artificial intelligence to the game. This medium priority task takes some time to run (1-5 seconds), but can be pre-empted by the high priority thread that controls the user interactions. The medium priority thread does not access the shared data structure (aSDS). Unfortunately the observed effect by users of the new version of the game is
that they occasionally experience long pauses of several seconds when it is not possible to interact with the game.

Suggest what the most likely cause of this problem is in the new 'improved' version of the game. Propose a solution to resolve the issue and carefully comment on why it works.

Question 3:

(a) For systems that require authentication of users of the system, what steps would you advise developers and users of the system to take to ensure as far as possible that the users who are authenticated by the system really are the person that they claim to be? For each suggestion, justify your selection with critical comment about what issue or issues is being addressed. In addition, what other issues would you advise the developers to investigate, to ensure the confidentiality and security of the data stored on the system?

(b) The TCP protocol provides a reliable stream-oriented communications medium, and yet it uses the IP protocol suite, an unreliable packet-oriented medium. Explain what 'reliable' means in this context, and describe how TCP's reliable stream-oriented service is implemented. Then explain and critically comment on the performance consequences of using TCP to communicate between a client and a server when:

1) A long distance between the client and the server is involved.

2) A highly interactive program is used on the server, for example, a cloud based editor which often involves the sending of single characters from the client to the cloud based editor. In each case above explain what can be/ is done to alleviate the impact on performance.

Reference no: EM131061849

Questions Cloud

What are the performance considerations : What are the performance considerations? What are the security requirements? Should we buy or build? What solutions does our competition leverage?
What is historic preservation and why is it important today : Who is Save Our Heritage Organisation (SOHO), what is their mission?. PLEASE do not "cut and paste" - use your own words to describe this historic preservation organization. Give at least three examples of HOW they educate, advocate and preserve i..
Problem regarding the audio and html5 : HTML5 supports several formats of audio. However, there is no single format that is compatible with every browser. Analyze two different ways that this issue can be addressed. Select the best solution for this issue and explain why you chose it.
Benefits and drawbacks of the design : Indicate any advantages and disadvantages as well as the benefits and drawbacks of the design. Include information about the ISP.
Evolution of imperative programming languages : In the evolution of imperative programming languages, features have been introduced, whilst other features have been removed or deprecated in 'successor' languages.
Why they are used and why can''t individual biasing work : What is the use of current mirrors in the models of amplifiers?
Construct the routing table of router r3 : Construct the routing table of router R3 for this configuration
Identify slos for the program : Explain what impact the use of SLOs has on the student experience. Explain what impact the use of SLOs has on program evaluation and revision.
Conduct an hour long observation of the child : Conduct an hour long observation of the child you have chosen to study to create your comprehensive guidance plan.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How to create both method contract and method specification

Your demonstrations of how to create both method contract and the method specification for the GetCourseByCourseID() method of the CourseList class were very well received by your team members

  Maximum number of employees

What is the maximum number of employees that a company with a health plan can have and not be subject to the COBRA rules?

  Sections of windows server pro

Complete the following sections of "Windows Server Pro: Install and Configure" in TestOut LabSim®:

  Discuss reasons and methods for accessing a remote computer

Discuss the reasons and methods for accessing a remote computer

  What would be the output of the countdown routine

Recursion is a powerful technique that is often utilized for a variety or problems. Often, people think iteratively rather than recursively. However, when thinking computationally, as in computer language, recursive techniques are often utilized.

  Evaluate why cost is not one of the five core metrics

Evaluate why cost is not one of the five core metrics of the SLIM model and speculate on the consequences if cost served as one.

  Importance of preinstallation and postinstallation tasks

Describe the importance of preinstallation and postinstallation tasks

  Determining the use of two arrays

Define two arrays x and f, each of size 10, using call-by-reference, to pass an array to a function, named sum. In main: define array, pass arrays, print out the array and the results on screen. In function sum, take arrays from main and sum the a..

  Find out the ouput for the following sequence of code

What will be the output of following code example = "snow world" example[3] = 's'

  What is server side and client side scripting

Describe and explain 5 underlying concepts that drive interaction design. Please include appropriate details and examples with applicable references in APA style.

  Show how you will go about normalizing it

Show how you will go about normalizing it.

  Create the logic for a program that continuously prompts

The application passes the value in turn to a method that computes the sum of all the whole numbers from 1 up to and including the entered number, and to a method that computes the product of all the whole numbers up to and including the entered n..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd