Name the widely used language processor development tool, Computer Engineering

Assignment Help:

Name the widely used Language Processor Development Tools (LPDTs).

Widely used Language processor development tools are:

Lex - A Lexical Analyzer Generator

Lex assists write programs whose control flow is directed through instances of regular expressions in the input stream. This is well fine for editor-script type transformations and for segmenting input into preparation for a parsing routine.

Lex source: It is a table of regular expressions and consequent program fragments. The table is translated to a program that reads an input stream, copying this to an output stream and partitioning the input in strings that match the specified expressions. Since each such string is recognized the consequent program fragment is executed. The recognition of the expressions is performed through a deterministic finite automaton generated through Lex. The program fragments written through the user are executed in the order wherein the corresponding regular expressions arise in the input stream.

YACC: It is Yet another Compiler-Compiler

Computer program input usually has some structure; actually, every computer program which does input can be thought of as defining an ''input language'' that it accept. An input language may be as complex like a programming language, or as easy as a sequence of numbers. Unluckily, usual input facilities are restricted, difficult to utilize, and for validity frequently are lax about checking their inputs.

YACC gives a general tool for describing the input to a computer program. The Yet another Compiler-Compiler user specifies the structures of his input, mutually with code to be invoked as each that structure is recognized. Yet another Compiler-Compiler turns such a specification in a subroutine that handles the input process; often, this is convenient and suitable to have most of the flow of control in the user's application handled through this subroutine.


Related Discussions:- Name the widely used language processor development tool

Determine 1''s complement representation of decimal number, 1's complement ...

1's complement representation of decimal number of -17 by using 8 bit representation is ? Ans. (17) 10 = (10001) 2 In 8 bit = 00010001 1's Complement = 11101110

What is the role of mar and mdr, What is the role of MAR and MDR? The ...

What is the role of MAR and MDR? The MAR (memory address register) is used to hold the address of the location to or from which data are to be transferred and the MDR(memory d

Explain the t flip flop, Explain the T Flip Flop? The toggle, or T, fli...

Explain the T Flip Flop? The toggle, or T, flip-flop is the bistable device that changes state on command from a common input terminal.   Truth Table

What is a PCI bus and discuss its aspects and usage, What is a PCI bus? Dis...

What is a PCI bus? Discuss its aspects and usage. Peripheral Component Interconnect (PCI): This bus was developed by Intel and introduced in 1993. It is geared specifically to

Balanced trees and their operations, what is ment by avl tree n insertion n...

what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion

QUELING SYTEM , SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYTEM...

SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYTEM IS EQUAL TO P/(1-p). NOTE:P=ROW

Advantages of specifying parameter assignment using defparam, State The adv...

State The advantages of specifying parameter assignments using defparam are: - This method always has precedence over specifying parameters at the instance of instantiation.

Define windows authentication, Windows Authentication This provider uti...

Windows Authentication This provider utilizes the authentication capabilities of IIS. After IIS completes its authentication, ASP.NET uses the authenticated identity's token to

What is organizational structure, What is Organizational Structure? A b...

What is Organizational Structure? A business organization may be structured in many dissimilar ways, depending upon the environment within which it handles.  There is always

Nanoprogramming - computer architecture, Nanoprogramming:  Second c...

Nanoprogramming:  Second compromise: nanoprogramming  it use a 2-level control storage organization  Top level is a vertical format memory  Output of the top level

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd