Name the widely used language processor development tool, Computer Engineering

Assignment Help:

Name the widely used Language Processor Development Tools (LPDTs).

Widely used Language processor development tools are:

Lex - A Lexical Analyzer Generator

Lex assists write programs whose control flow is directed through instances of regular expressions in the input stream. This is well fine for editor-script type transformations and for segmenting input into preparation for a parsing routine.

Lex source: It is a table of regular expressions and consequent program fragments. The table is translated to a program that reads an input stream, copying this to an output stream and partitioning the input in strings that match the specified expressions. Since each such string is recognized the consequent program fragment is executed. The recognition of the expressions is performed through a deterministic finite automaton generated through Lex. The program fragments written through the user are executed in the order wherein the corresponding regular expressions arise in the input stream.

YACC: It is Yet another Compiler-Compiler

Computer program input usually has some structure; actually, every computer program which does input can be thought of as defining an ''input language'' that it accept. An input language may be as complex like a programming language, or as easy as a sequence of numbers. Unluckily, usual input facilities are restricted, difficult to utilize, and for validity frequently are lax about checking their inputs.

YACC gives a general tool for describing the input to a computer program. The Yet another Compiler-Compiler user specifies the structures of his input, mutually with code to be invoked as each that structure is recognized. Yet another Compiler-Compiler turns such a specification in a subroutine that handles the input process; often, this is convenient and suitable to have most of the flow of control in the user's application handled through this subroutine.


Related Discussions:- Name the widely used language processor development tool

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Example of pruning, Example of Pruning: As an example, we are assume t...

Example of Pruning: As an example, we are assume that the four choices for player one, there we are looking only two moves ahead 1 for player one and 1 for player two such as

What is thread, What is Thread? A thread, sometimes termed a lightweigh...

What is Thread? A thread, sometimes termed a lightweight process (LWP), is a fundamental unit of CPU utilization; this comprises a thread ID, a register set, a program counter

Produce an analysis model of the proposed system, Question: Read the fo...

Question: Read the following case study and answer the questions based on it. The local airline company needs to develop a system for controlling air traffic at the airport

Convert the following binary numbers into hexadecimal, Q. Convert the follo...

Q. Convert the following BINARY numbers into HEXADECIMAL, double check by converting the result HEXADECIMAL to BINARY. a) 1101.0110 b) 1011.11010 c) 11110.01011

Karnaugh maps, Minimisation using Boolean algebra is not always straight fo...

Minimisation using Boolean algebra is not always straight forward and sometimes it is not obvious if a further manipulation would give a simpler circuit. Karnaugh maps are a muc

Advantages and disadvantages of structured analysis, Advantages and Disadva...

Advantages and Disadvantages of Structured Analysis With time, you will find out that most customers understand structured methods better than object oriented (OO) methods. As

Discuss about simple mail transfer protocol briefly, Discuss about Simple M...

Discuss about Simple Mail Transfer Protocol briefly. SMTP: It is sands for Simple Mail Transfer Protocol, is a protocol for sending e-mail messages among servers. Most e-

Procedure level- levels of parallel processing, Procedure Level Here, p...

Procedure Level Here, parallelism is accessible in the form of parallel executable procedures. In this situation, the design of the algorithm plays a main role. For example eac

What are advantages and disadvantages of using eeprom, What are advantages ...

What are advantages and disadvantages of using EEPROM? The benefits are that EEPROM do not have to be removed for erasure. Also it is possible to delete the cell contents selec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd