Specific design criteria

Assignment Help Basic Computer Science
Reference no: EM13137535

1) All languages have specific design criteria, a goal in mind. . 

2) Give two languages that are in direct conflict with each other. Provide examples of these conflicts as either programming examples (features allowed or not allowed) or program model, (environment). Compare and contrast the terms readability and writeability regarding your selected two languages. 

3) All languages evolve; describe some of the features that you believe are appropriate for changes in programming languages. Describe, in your opinion, the goal of program language evolution should be. 

4) What is a predicate transformer function? 

5) Which semantics approach is most widely used and why?, Which is the most accurate?, and which semantics approach provides the most benefit to the language developer (first define what the benefit is, and then describe why you think this is a benefit) 

6) Describe the different types of Semantics (chapter 4), when and how are they applied, what are the advantages or disadvantages to each type. 

7) Explain why compilers use parsing algorithms that work on only on a subset of all grammars. 

8) Make an argument, which type of parser is more powerful, bottom-up or top down, use as may examples as possible to support your side, but only support one side. 

9) What is a variable, what is the relationship between a variable and attributes and why don't most functional languages have them (variables). 


10) What are implicit heap-dynamic variables, when, how and why are they used, when should they not be used. 

11) Why is the heap slower than the stack, what techniques are used to maintain heap storage (skipping garbage collection and de-allocation) 

12) What is dynamic scoping, when and where it is applied, what are the performance impacts of using dynamic scoping and how can these be minimized. 

13) What are the advantages and disadvantages of user-defined ordinal types as data types? What are the advantages and disadvantages to an associative array? 

14) Make an argument that narrowing or widening conversions are never safe or are safe, support your claim with examples. 

15) Define elaboration, give an example showing declaration and binding and exactly when elaboration takes place, use any language you prefer 

16) Give a real world example and usage of a Union, Tuple, associative array, (chose a language of your choice) and why you would use each. 

17) Give an example of a strongly typed language 

18) What is the difference between casting and coercions (is there a difference?, if so what is it)

Reference no: EM13137535

Questions Cloud

What volume is occupied by 25kg of carbon dioxide : if the density of carbon dioxide in air is .65mg/L, what volume is occupied by 25kg of carbon dioxide?
Complete consolidation working papers for parrot and hollow : The separate company statements for Parrot and Hollow appear in the first two columns of the partially completed consolidation working papers. Complete consolidation working papers for Parrot and Hollow for the year 2005.
Find probability one detection system will detect an attack : Military radar and missile detection systems are designed to warn a country of enemy attacks. What is the probability that 1 detection system will detect an attack.
Calculate the mass of silver chloride : Silver chloride, often used in silver plating, contains 75.27% Ag. Calculate the mass of silver chloride required to plate 225 mg of pure silver.
Specific design criteria : Give two languages that are in direct conflict with each other. Provide examples of these conflicts as either programming examples (features allowed or not allowed) or program model, (environment). Compare and contrast the terms readability and write..
Calculate this company profit margin-total asset turnover : Calculate this company's profit margin, total asset turnover, and return on total assets for 2009 and 2010. Comment on the results.
Managerial decision-makers : Activity-based costing (ABC) information cannot be used by managerial decision-makers to evaluate the:
French system of anti-terrorism : Using outside sources available on the internet or in the online library, research the terrorism policies of Israel, France, and the UK.
Hazen-williams formula -find the diameter of a pipe : Hazen-Williams Formula- Find the Diameter of a Pipe, The length of cast-iron pipe is to be 4200 ft., and the head causing flow is to be 12.6ft. After the pipe has been in service 5 years, it is expected to discharge water at a rate equal to 3.2 cf..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why supply-demand-equilibrium price different in short term

Price of product in short-term and long-term also describe why you believe supply, demand, or equilibrium price will be different, if at all, in short-term and long-term.

  Explaining publication of material in foreign languages

Which of the given statements about publication of material in foreign languages is not right? it is competitive neccessity or it must be accurate.

  Why chain of custody must be followed in investigation

You are a computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired. What is chain of custody and why must it be followed in investigations?

  Good meetings in software development life cycle

Provide three words or phrases that explain why "good meetings" are important during the Software Development Life Cycle?

  Actions against company security camera

Joe the janitor is recorded on the company security camera one night taking pictures with his cell phone of the office of the CEO after he is done cleaning it. What will you do and what is your justification for your actions?

  Significant difference of typical salary for system analyst

Is there a significant difference between typical salaries for system analyst, designers, and developers? What is the difference between typical salaries for these different groups?

  Page translation table for virtual memory system

Design a page translation table to meets the requirements of virtual memory system.

  Design a plan for email content which was leaked

Suppose that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). Design a plan for this investigation.

  Explaining major provisions of telecommunications act

Write down some of the major provisions of the Telecommunications Act of 1996?

  Probability and set theory questions

COMP 2804 Assignment 3,  The Fibonacci numbers are defined as follows,  Assume we roll each of D1, D2, and D3 once, independently of each other. Let R 1 , R2, and R3 be the numbers on the top face of D1, D2, and D3, respectively.

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Determine present worth-future worth of soldering machine

The initial cost is in week 0 and the payments are in years 1-4. Determine the present worth, future worth, and annual worth for.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd