Differentiate b/w program translation and interpretation, Computer Engineering

Assignment Help:

Differentiate between program translation and program interpretation.

The program translation model makes the execution gap through translating a program written in a programming language, termed as the source program (SP), in an equivalent program into the machine or assembly language of the computer system, termed as the target program (TP). Subsequent diagram depicts the program translation model.

 

1945_program translation model.png

 

In a program interpretation process, the interpreter reads the source program and stores this in its memory. This bridges an execution gap without making a machine language program therefore we can say that the interpreter is a language translator. Although, this takes one statement of higher-level language at a time, translates this in machine language and executes this immediately. Translation and execution are continued for each statement. The absence of a target program means the absence of an outer interface of the interpreter. Thus language-processing activity of an interpreter can't be separated by its program execution activities. Therefore we can say that interpreter executes a program written into a programming language. In essence, the execution gap vanishes. Subsequent figure depicts the program interpretation model.

1000_program interpretation process.png

The program translation model characteristics are:

  • A program should be translated before this can be executed.
  • The translated program may be saved into a file. The saved program may be executed repeatedly.
  • A program should be retranslated subsequent modifications.

The program interpretation model characteristics are:

  • The source program is retained into the source form itself that is no target program form exists.
  • A statement is analyzed throughout its interpretation.

Related Discussions:- Differentiate b/w program translation and interpretation

How do you make an append query, Append query can be used if you would like...

Append query can be used if you would like to add new rows of data to an already active table. The process of making an append query follows these steps they are. ? Basic step

What are the main data structures used in rdbms, What are the main data str...

What are the main data structures used in the following areas: RDBMS, Network data model and Hierarchical data model? RDBMS = Array (i.e. Array of structures) Network data m

What are types of applets, There are two different parts of applets. Truste...

There are two different parts of applets. Trusted Applets and Untrusted applets. Trusted Applets are applets with predefined security and Untrusted Applets are applets without any

What is layer, What is layer? A layered system is ordered set of virtua...

What is layer? A layered system is ordered set of virtual worlds. Every build-in terms of one's below it and providing the execution basis for one above it. The objects in ever

What is software engineering, Software engineering is:- The application...

Software engineering is:- The application of a disciplined engineering move towards to the development of software systems. A body of information and knowledge in software d

Software aspects - computer technology , Software Aspects: Software is...

Software Aspects: Software is a generic term covering the concepts, procedures and instructions which enable computer systems to do useful things. Usually, software is conceiv

What is a user diagram protocol, UDP (User Diagram Protocol) is? It is ...

UDP (User Diagram Protocol) is? It is both Connectionless and Message Oriented.

Read after write and write after write - data hazards, RAW  and WAW - Data ...

RAW  and WAW - Data hazards: RAW (read after write) - j tries to read a source before i writes it, hence j wrongly gets the old value .This is the most usual type of

Symmetric and asymmetric encryption algorithms, Compare and contrast symmet...

Compare and contrast symmetric & asymmetric encryption algorithms. Your response should contain a brief overview of the cryptographic basis for every type of algorithm, and a compa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd