Discuss in detail table management techniques, Computer Engineering

Assignment Help:

Discuss in detail Table management Techniques?

An Assembler uses the subsequent tables:

OPTAB: Operation Code Table consists of mnemonic operation code and machine language equivalent of this.

SYMTAB: Symbol Table keeps symbolic label, operand and their consequent machine.

LITTAB is a table of literals utilized in the program

For efficiency reasons SYMTAB should remain in main memory during passes I and II of the assembler. Table of literals is not accessed as frequently as SYMTAB; though this may be accessed sufficiently often to justify its presence in the memory. Only a part of LITTAB can be remained in memory, if memory is at a premium. OPTAB must be in memory during pass I.


Related Discussions:- Discuss in detail table management techniques

What are the steps followed in testing, What are the steps followed in test...

What are the steps followed in testing? i. Unit testing - The individual components are tested in this method of testing. ii. Module testing - Related collection of independ

Implementing recursive function the data structure, For executing recursive...

For executing recursive function the data structure used is: For executing recursive function, stack is used as a data structure.

SERVER, How to configure TSM server

How to configure TSM server

Essential features of an algorithm, Necessary features of an algorithm: ...

Necessary features of an algorithm: 1.Input: The algorithm should take zero or more input. 2. Output: The algorithm should generate one or more outputs.  3. Definiteness:

Handling multiple devices - computer architecture, Handling Multiple Device...

Handling Multiple Devices Interrupt Priority   Continue to accept interrupt requests from higher priority components   Disable interrupts from component at the sa

What is public key cryptography, What is Public Key Cryptography Publi...

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret

How do you recognize the performance bottlenecks, Performance Bottlenecks c...

Performance Bottlenecks can be identified by using monitors. These monitors might be application server monitors, database server monitors, web server monitors and network monitors

Can link and association applied interchangeably, No, You cannot apply the ...

No, You cannot apply the link and Association interchangeably. Since link is used show the relationship among the two objects. But Association is used signify the relationship

Explain elements of language grammer, Explain elements of language Gram...

Explain elements of language Grammer . As proposed through Noam Chomsky, a grammar G contains the following elements: a. A finite set N of non terminal symbols. b. A f

Show the decimal equivalent of a binary number, Q. Show the Decimal equival...

Q. Show the Decimal equivalent of a binary number? In binary numbers we have two digits 0 and 1 in addition they can also be signified as a string of these two-digits known as

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd