Describe language processing activities, Computer Engineering

Assignment Help:

Describe language processing activities?

There are two different kinds of language processing activities:

a. Program generation activities

b. Program execution activities

Program generation activities: A program generation activity tends at automatic generation of a program. A specification language is source language of an application domain and the target language is classically a procedure oriented programming language. The given figure below shows program generation activity

program generation activity

The program generator is a software system that accepts the requirement of a program to be generated and makes a program in the target. PL. The program generator initiates a new domain in between the application and PL domains. We call it the program generator domain. The specification gab is here gabbing in between the application domain and the program generator domain. Such gab is smaller than the gab in between the application domain and PL domain.

Program execution activities: A program execution activity classifies system. Two model program executions are:

a. Translation

b. Interpretation

Translation: The program translation models bridges execution gap through translating a program written into a PL, called the source program in an equivalent program in the assembly or machine language of the computer system.

408_Translation and Interpretation.png

Interpretation: The interpreter reads the source program and stores this in its memory. Throughout interpretation this takes a statement, finds its meaning and performs actions that implement this.

2191_Translation and Interpretation 1.png


Related Discussions:- Describe language processing activities

Writing down your own interrupt service routines, Q. Writing down your own ...

Q. Writing down your own Interrupt Service Routines? Here are a few rules which should be kept in mind while writing down your own Interrupt Service Routines: 1.  Use Int 21

Signed 1’s complement representation, Q. Signed 1s complement representatio...

Q. Signed 1s complement representation? Another possibility that is also simple is use of signed 1's complement. Signed 1's complement has a principal. Add both numbers includi

Explain characteristics of prototyping, Question: (a) List five main c...

Question: (a) List five main characteristics of ‘Prototyping'. (b) Describe briefly why ‘Prototyping' is essential to Rapid Application Development. (c) Describe the 2 t

Example of calculate maximum access time & cost of switch, Calculate the ma...

Calculate the maximum access time that can be permitted for the data and control memories in a TSI switch with a single input and single output trunk multiplexing 2500 channels. Al

Where do you set automatic correlation options, Automatic correlation from ...

Automatic correlation from web point of sight can be set in recording options and correlation tab. Here we can enable correlation for the whole script and choose either issue onlin

Why SS7 protocol is use, SS7 Protocol uses: (A) Out of band signalling...

SS7 Protocol uses: (A) Out of band signalling. (B) Associated signalling. (C) Speech control signalling. (D) No signalling. Ans: SS7 Protocol uses Out of

State the term- use a define function, State the term- Use a define functio...

State the term- Use a define function This is almost exactly the same approach as #define and -D compiler arg that C programs use. In your  Verilog  code,  use  a  'define  to

What kind of system do we need to run gimp, Any system able of run Gnome 2,...

Any system able of run Gnome 2, KDE 3.2, Windows 2000, Mac OS X and later versions should be capable to run GIMP. GIMP's biggest appetite is for memory and how much you will requir

Sap system configuration, SAP system configuration includes It include...

SAP system configuration includes It includes :- a) Dialog tasks b) Update tasks.

Define linear probing with respect to hashing technique, Define Linear Pro...

Define Linear Probing Linear Probing:  The easiest way to resolve a collision is to begin with the hash address and do a sequential search by the table for an empty location.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd