Explain the criteria to classify data structures, Computer Engineering

Assignment Help:

Explain the criteria to classify data structures used for language processors?

The data structures utilized in language processing can be classified upon the basis of the subsequent criteria:

1. Behavior of data structure (where a linear or non-linear data structure)

2. Reasons of a data structure (whether a search data structure or an assigned data structure)

3. Life time of a data structure (whether used throughout language processing or throughout target program execution)

A linear data structure contains a linear arrangement of components in the memory. A linear data structure needs a contiguous area of memory for its components. It poses a problem in situations where the size of a data structure is not easy to predict. The components of non linear data structures are accessed by using pointers. Therefore the components need not occupy contiguous area of memory.

Search Data structures are used throughout language processing to keep attribute information concerning various entities in the source program. Into this the entry for an entity is made only once, although may be searched for huge number of times. Assigned data structures are characterized through the fact which the address of memory area allocated to an entity is identify to the users. Therefore no search operations are conducted.


Related Discussions:- Explain the criteria to classify data structures

What is the difference between dpi and ppi, Question : (a) "Resolution ...

Question : (a) "Resolution refers to the sharpness and clarity of an image" (i) Explain what you understand by the above statement. (ii) What is the difference between D

New execution of listpermutations, Update the permutation algorithm from th...

Update the permutation algorithm from the text to obtainthe correct list of permutations even if the string haves repeated letters. For example, if you call ListPermutations on the

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Explain briefly how the bus topology operates, Question 1: a) The aim ...

Question 1: a) The aim of a computer network is to increase efficiency and reduce costs. Describe how networks achieve the above. b) Explain briefly how the bus topology op

C pograming, why we use void main in c progrmeing

why we use void main in c progrmeing

Example of frames format with ethernet, Compute the number of Ethernet fram...

Compute the number of Ethernet frames formed for a data of 64 KB IP packet. Following figure demonstrates the format of the Ethernet frame. Here maximum data into a frame is 15

Boolean algebra, https://www.chegg.com/homework-help/questions-and-answers/...

https://www.chegg.com/homework-help/questions-and-answers/57-karnaugh-maps-7-diagram-shows-system-hot-chocolate-drinks-vending-machine-vending-machi-q91661540

Describe about the protection features present in ms access, If a programme...

If a programmer doesn't wish to make modifies to the document he can lock the document data and its code from more changes by changing the extension of the file system to .MDE. Cha

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd