Name the widely used language processor development tool, Computer Engineering

Assignment Help:

Name the widely used Language Processor Development Tools (LPDTs).

Widely used Language processor development tools are:

Lex - A Lexical Analyzer Generator

Lex assists write programs whose control flow is directed through instances of regular expressions in the input stream. This is well fine for editor-script type transformations and for segmenting input into preparation for a parsing routine.

Lex source: It is a table of regular expressions and consequent program fragments. The table is translated to a program that reads an input stream, copying this to an output stream and partitioning the input in strings that match the specified expressions. Since each such string is recognized the consequent program fragment is executed. The recognition of the expressions is performed through a deterministic finite automaton generated through Lex. The program fragments written through the user are executed in the order wherein the corresponding regular expressions arise in the input stream.

YACC: It is Yet another Compiler-Compiler

Computer program input usually has some structure; actually, every computer program which does input can be thought of as defining an ''input language'' that it accept. An input language may be as complex like a programming language, or as easy as a sequence of numbers. Unluckily, usual input facilities are restricted, difficult to utilize, and for validity frequently are lax about checking their inputs.

YACC gives a general tool for describing the input to a computer program. The Yet another Compiler-Compiler user specifies the structures of his input, mutually with code to be invoked as each that structure is recognized. Yet another Compiler-Compiler turns such a specification in a subroutine that handles the input process; often, this is convenient and suitable to have most of the flow of control in the user's application handled through this subroutine.


Related Discussions:- Name the widely used language processor development tool

Difference between latches and flip-flops based designs, What is the differ...

What is the difference between latches and flip-flops based designs Latches are level sensitive whether flip-flops are edge sensitive. So, latch based design and flop based des

Define cache line, Define cache line. Cache block is used to refer to a...

Define cache line. Cache block is used to refer to a set of contiguous address location of some size. Cache block is also referred to as cache line.

Algorithm to insert a key in b-tree, Algorithm to insert a key in B-tree is...

Algorithm to insert a key in B-tree is as follows: 1.  First search is completed for the place where the new record must be put. As the keys are inserted, they are sorted into

Unit test an mvc application, Is it possible to unit test an MVC applicatio...

Is it possible to unit test an MVC application without running the controllers in an ASP.NET process? Ans) Yes, all the features in an asp.net MVC application are interface ba

Explain call and return statements, Q. Explain Call and Return Statements? ...

Q. Explain Call and Return Statements? CALL:       CALL X    Procedure Call to procedure/function named X   CALL instruction causes the following to happen:  1.  Decre

Describing Random Algorithm, Suppose you''re given n numbers and asked to f...

Suppose you''re given n numbers and asked to find a number that is greater than or equal to the median a) What is the lower bound for the worst case complexity of this problem?

Define main memory and auxiliary memory, Define main memory and auxiliary m...

Define main memory and auxiliary memory? The memory unit that communicates directly with the cpu is known as main memory [RAM].Devices that give backup storage are known as aux

Predicates in propositional model, Predicates in propositional model: ...

Predicates in propositional model: The predicates take a number of arguments in which for now we assume are ground terms and represent a relationship between those arguments t

Define the term- encryption, Define the term- encryption The user would ...

Define the term- encryption The user would then type in O P E and card purchase will be authorised. This extra protection is used as well as encryption. Some of the new syste

Determine about the security policy, Determine about the Security Policy ...

Determine about the Security Policy In the United States, the government has a separate organisation looking after the security measures and providing guidelines to all departm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd