Write an algorithm to outline the macro-expansion, Computer Engineering

Assignment Help:

Write an algorithm to outline the macro-expansion using macro-expansion counter.

The flow of control throughout macro expansion can be implemented by using a MEC that is macro- expansion counter. The basic outline of algorithm is as given below:

1.  MEC: = statement numbers of first statement Following the prototype statement;

2.  When statement pointed through MEC is not a MEND statement

(a)  If a model statement then  

(i)  Expand the statement. //By Expanding the MEC Command

(ii) MEC:=MEC+1;

(b) Else (i.e. a pre processor statement)   

(i)  MEC:=new value given in the statement; //New value of Preprocessor Statement

 3.  Exit from macro expansion.


Related Discussions:- Write an algorithm to outline the macro-expansion

What is glitch and what are causes of it, What is glitch? What causes this ...

What is glitch? What causes this (describe with waveform)? How to overcome this? The gated clock‘s corresponding timing diagram demonstrates that it implementation can lead to

Illustrate about the macros and give its example, Illustrate about the macr...

Illustrate about the macros and give its example For instance, assume you want some data to be input into a spreadsheet if result of a calculation in cell K40 is negative: m

Explain the significance ipv6 over ipv4, Explain the significance IPV6 over...

Explain the significance IPV6 over IPV4. The maximum size of an Ipv6 datagram is 65575 bytes, with the 0 bytes Ipv6 header. Ipv6 also describe a minimum reassembly buffer size:

Extjs, tell some thing about htmleditor in extjs whether it contains attach...

tell some thing about htmleditor in extjs whether it contains attachment button or not

JAVA, HOW WAS JAVA INVENTED?

HOW WAS JAVA INVENTED?

What is the maximum number of fragments, What is the maximum number of frag...

What is the maximum number of fragments that can result from a single IP Datagram? Explain. To fragment a datagram for transmission across a network, a router utilizes the netw

Re:- exam help, Hello there i have 4 exams of ICT and i am after a tutor wh...

Hello there i have 4 exams of ICT and i am after a tutor who can help me in those 4 subjects. One hour for each subjects will be good for me as i have sample papers ready for all s

What are the various layers of a file system, What are the various layers o...

What are the various layers of a file system? The file system is composed of lots of dissimilar levels. Each level in the design uses the characteristic of the lower levels to

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd