Differentiate b/w program translation and interpretation, Computer Engineering

Assignment Help:

Differentiate between program translation and program interpretation.

The program translation model makes the execution gap through translating a program written in a programming language, termed as the source program (SP), in an equivalent program into the machine or assembly language of the computer system, termed as the target program (TP). Subsequent diagram depicts the program translation model.

 

1945_program translation model.png

 

In a program interpretation process, the interpreter reads the source program and stores this in its memory. This bridges an execution gap without making a machine language program therefore we can say that the interpreter is a language translator. Although, this takes one statement of higher-level language at a time, translates this in machine language and executes this immediately. Translation and execution are continued for each statement. The absence of a target program means the absence of an outer interface of the interpreter. Thus language-processing activity of an interpreter can't be separated by its program execution activities. Therefore we can say that interpreter executes a program written into a programming language. In essence, the execution gap vanishes. Subsequent figure depicts the program interpretation model.

1000_program interpretation process.png

The program translation model characteristics are:

  • A program should be translated before this can be executed.
  • The translated program may be saved into a file. The saved program may be executed repeatedly.
  • A program should be retranslated subsequent modifications.

The program interpretation model characteristics are:

  • The source program is retained into the source form itself that is no target program form exists.
  • A statement is analyzed throughout its interpretation.

Related Discussions:- Differentiate b/w program translation and interpretation

C program, Write a program to find the area under the curve y = f(x) betwee...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Computation step in time complexity of an algorithm, Q. Computation step in...

Q. Computation step in time complexity of an algorithm? So First in the computation step the local processor executes an arithmetic and logic operation. Afterwards the several

#MyLife, where should I work?

where should I work?

How many i/p & o/p a full adder logic circuit will have, A full adder logic...

A full adder logic circuit will have ? Ans. The full adder logic circuit also accounts the carry i/p generated in the earlier stage and it will add two bits. Hence three inputs

Explain characteristics in java for e-commerce applications, Explain the ch...

Explain the characteristics and utilities available into java that makes it appropriate for developing e-commerce applications. Following are the characteristics and utilities

Determine about the blocking suspicious behaviour, Determine about the bloc...

Determine about the blocking suspicious behaviour The response could be spontaneous and automatic, with an option to generate the alert message manually. The history recorded i

What is microprocessor, Microprocessor is a program-controlled device, whic...

Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and implements the instructions. Most Micro Processor is single- chip devices.

Explain sequential sharing, Explain Sequential Sharing In this sharing ...

Explain Sequential Sharing In this sharing method, a file can be shared by just one program at a time, i.e. file accesses by P1 and P2 are spaced out over time. A lock field ca

Technical Support Engineer, I''m seeking a challenging professional working...

I''m seeking a challenging professional working position in the field of Information Technology,where I’ll be given the chance to enhance & expand the skills & experience

Sap system-wide security settings, You are required to review the system-wi...

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system. You are to produce a report (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd