Describe language processing activities, Computer Engineering

Assignment Help:

Describe language processing activities?

There are two different kinds of language processing activities:

a. Program generation activities

b. Program execution activities

Program generation activities: A program generation activity tends at automatic generation of a program. A specification language is source language of an application domain and the target language is classically a procedure oriented programming language. The given figure below shows program generation activity

program generation activity

The program generator is a software system that accepts the requirement of a program to be generated and makes a program in the target. PL. The program generator initiates a new domain in between the application and PL domains. We call it the program generator domain. The specification gab is here gabbing in between the application domain and the program generator domain. Such gab is smaller than the gab in between the application domain and PL domain.

Program execution activities: A program execution activity classifies system. Two model program executions are:

a. Translation

b. Interpretation

Translation: The program translation models bridges execution gap through translating a program written into a PL, called the source program in an equivalent program in the assembly or machine language of the computer system.

408_Translation and Interpretation.png

Interpretation: The interpreter reads the source program and stores this in its memory. Throughout interpretation this takes a statement, finds its meaning and performs actions that implement this.

2191_Translation and Interpretation 1.png


Related Discussions:- Describe language processing activities

Difference between static and dynamic RAM, Difference between static and dy...

Difference between static and dynamic RAM. Draw the circuits of one cell of each and explain its working. Ans: Differentiation among Static RAM and Dynamic RAM: Static

Avl tree rotation and b tree construction in data structure, Elements are g...

Elements are given 3,14,7,1,8,5,11,17,,6,23,12,20,26,4,16,18,24,25,19 We will construct b tree and avl tree And after that delete some integers

Differentiate between protection and security, Differentiate between Protec...

Differentiate between Protection and Security Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a

Events by which we can program "help texts", What are the events by which w...

What are the events by which we can program "help texts" and display "possible value lists"? -PROCESS ON HELP-REQUEST (POH). -PROCESS ON VALUE-REQUEST (POV).

Typewriters information distribution, TYPEWRITERS : Typewriter is the most...

TYPEWRITERS : Typewriter is the most common machine used in almost all offices. Typewritten letters are attractive in appearance as compared to handwritten ones. The same matter c

What are overlays, What are overlays? To enable a process to be larger ...

What are overlays? To enable a process to be larger than the amount of memory allocated to it, overlays are used. The idea of overlays is to keep in memory only those instructi

Classify process and differentiate program, Classify Process, differentiate...

Classify Process, differentiate program, process A process maybe concerned to be a program being run. A program isn't a process of itself; it's a passive Entity while the proce

How do the registers help in instruction execution, Q. How do the registers...

Q. How do the registers help in instruction execution? We will discuss this in following steps: Step 1: First step of instruction execution is to fetch instruction which

State the advantages of real time processing, Real time (transaction) proce...

Real time (transaction) processing In real time (transaction) processing files are generally updated in real time (for example when booking flights on an airplane); however in

Explain that lost acknowledgement in packet retransmission, Explain that th...

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd