Name the widely used language processor development tool, Computer Engineering

Assignment Help:

Name the widely used Language Processor Development Tools (LPDTs).

Widely used Language processor development tools are:

Lex - A Lexical Analyzer Generator

Lex assists write programs whose control flow is directed through instances of regular expressions in the input stream. This is well fine for editor-script type transformations and for segmenting input into preparation for a parsing routine.

Lex source: It is a table of regular expressions and consequent program fragments. The table is translated to a program that reads an input stream, copying this to an output stream and partitioning the input in strings that match the specified expressions. Since each such string is recognized the consequent program fragment is executed. The recognition of the expressions is performed through a deterministic finite automaton generated through Lex. The program fragments written through the user are executed in the order wherein the corresponding regular expressions arise in the input stream.

YACC: It is Yet another Compiler-Compiler

Computer program input usually has some structure; actually, every computer program which does input can be thought of as defining an ''input language'' that it accept. An input language may be as complex like a programming language, or as easy as a sequence of numbers. Unluckily, usual input facilities are restricted, difficult to utilize, and for validity frequently are lax about checking their inputs.

YACC gives a general tool for describing the input to a computer program. The Yet another Compiler-Compiler user specifies the structures of his input, mutually with code to be invoked as each that structure is recognized. Yet another Compiler-Compiler turns such a specification in a subroutine that handles the input process; often, this is convenient and suitable to have most of the flow of control in the user's application handled through this subroutine.


Related Discussions:- Name the widely used language processor development tool

#title.sequential circuit, design modulo 12 up synchronous counter using t ...

design modulo 12 up synchronous counter using t flip flop

Illustrate the term EDI trading patterns, Illustrate the term EDI Trading P...

Illustrate the term EDI Trading Patterns? EDI Trading Patterns are illustrated below: a. Hubs and Spokes: Several of the prime movers into the adoption of Electronic Da

Read after write and write after write - data hazards, RAW  and WAW - Data ...

RAW  and WAW - Data hazards: RAW (read after write) - j tries to read a source before i writes it, hence j wrongly gets the old value .This is the most usual type of

Optimal number of disks , John Lindsay sells disks that have 25 software pa...

John Lindsay sells disks that have 25 software packages that show a variety of financial functions, including net present value, internal rate of return, and other financial progra

Illustrate role of world wide web in field of e-commerce, Illustrate the ro...

Illustrate the role of World Wide Web into the field of e-commerce. In the 1990 year, the advent of the World Wide Web upon the Internet represented a turning point into e-com

Create new user account - system administrator, A common task for a system ...

A common task for a system administrator is to create new user accounts. In this lab you will be creating output that looks like an /etc/passwd file. The Problem You are to

Describe architecture of wap gateway, Describe architecture of WAP gateway....

Describe architecture of WAP gateway. WAP GATEWAY : It is a very unique product giving semi-automatic redirection of HTML documents to WAP compatible mobile phones. Wir

What is difference between ram and fifo, What is difference between RAM and...

What is difference between RAM and FIFO? FIFO certainly does not have address lines. It is stands for first in and first out. It is an algorithm based method. It is used to s

Describe the fundamental characteristics of antennas, Question 1: (a) ...

Question 1: (a) Describe the two fundamental characteristics of antennas explaining in detail how it affects the security of wireless networks. (b) What is a wireless cli

Which rule is used for the expansion of nested macro calls, The expansion ...

The expansion of nested macro calls done by using of? Ans. LIFO rule is used for the expansion of nested macro calls.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd