Why lexical analysis is separated from syntax analysis

Assignment Help Computer Engineering
Reference no: EM1328254

1. What does the term aliasing mean?
a. Having two names for the same memory cell
b. Having two referencing methods for the same memory cell
c. Both a and b.
d. Neither a nor b.

2. The most rigorous means of describing the meaning of a program is
called _________ semantics.
a. dynamic
b. denotational
c. static
d. axiomatic

3. Lexical analysis is separated from syntax analysis because:
a. lexical analysis is less complex.
b. optimizing the lexical analyzer provides more benefits than
optimizing the syntax analyzer.
c. lexical analysis has to perform input/output operations and,
therefore, is platform dependent.
d. all of the above.

4. The output of _____ compilers must be linked to operating system
programs, especially __________ routines.
a. all; input/output
b. all; device drivers
c. some; input/output
d. some; device drivers

5. The extreme opposite of a compiler is known as a(n):
a. interpreter.
b. translator.
c. linker.
d. hybrid.

6. The following list contains steps that may/may not be part of the
process of compilation. Place the steps in the correct order that are
part of the compilation process, omitting those that are not part of
the compilation process.
i. lexical analysis
ii. linking
iii. formatting
iv. semantic analysis
v. optimization
vi. code generation
vii. syntax analysis
viii. loading
a. i, ii, iii, iv, v
b. iv, i, vii, v, ii
c. i, vii, vi, iv, v, ii
d. vii, i, iv, v, vi, iii
e. i, vii, iv, v, vi

7. The data structure built by a compiler that represents the
hierarchical syntactic structure of a given program is called a(n)
__________ tree.
a. parse
b. trace
c. syntax
d. module

8. How is Scheme opposite to Common Lisp?
a. Scheme is large and complex; Common Lisp is small.
b. Common Lisp is not an ANSI standard; Scheme is.
c. Scheme is exclusively statically scoped; Common Lisp supports
dynamic scoping.
d. Common Lisp is interpreted; Scheme is compiled.

9. The primary progenitor of COBOL was the programming language
known as:
a. Pseudocode.
b. Short Code.
c. Speedcode.
d. Flow-matic.

10. The C++ programming language is very popular because it is:
a. backward compatible with C.
b. object-oriented.
c. widely available.
d. all of the above.

11. Plankalkül included the following features except:
a. (recursive) record structures.
b. ones-complement notation floating point type.
c. iterative statement.
d. arrays.

12. For a large production application, a __________ language is most
likely to be used:
a. compiled
b. interpreted
c. hybrid
d. script

13. Java and Perl are examples of __________ languages.
a. compiled
b. interpreted
c. hybrid
d. script

14. What innovation introduced in ALGOL68 is often credited to Pascal?
a. user-defined data types
b. block statement
c. select statement
d. bit-string

15. The syntax analysis part of a compiler is known as a:
a. language generator.
b. language recognizer.
c. context free grammar.
d. assembler.

16. If the left-hand side (LHS) appears in the right-hand side (RHS) of a
rule, it is a(n):
a. error.
b. iteration.
c. meta-statement.
d. recursion.

17. A hierarchical structure that describes the syntactic structure of
sentences in a language is called a(n):
a. descendant chart.
b. family tree.
c. parse tree.
d. ancestor list.
e. none of the above.

18. An alternate term for lexical analyzer is:
a. pattern matcher.
b. parser.
c. pushdown automaton.
d. all of the above.

19. A concept of ________ means that a small number of primitive
constructs can be combined in a small number of ways to build the
control and data structures of the language.
a. simplicity
b. parsimony
c. relativity
d. orthogonality

20. The task of a bottom-up parser is to find the handle of any given
right sentential form that can be generated by its associated
grammar.
a. True
b. False

21. A logical rule that is assumed to be true is termed a(n):
a. axiom.
b. theorem.
c. corollary.
d. inference.

22. Using EBNF, the C selection statement is depicted as:
<selection> &#1048774; if (<expression>) <statement> [else <statement>];
Without brackets, how many BNF rules would be required to depict
the C selection statement?
a. 1
b. 2
c. 3
d. More than 3

23. With a von Neumann architecture, assignment is based on:
a. pipelining operations.
b. piping operations.
c. iterative operations.
d. functional operations.

24. The most common programming languages, dating back to the
1940s are called:
a. functional.
b. object-oriented.
c. rule-based.
d. imperative.

25. Consider the rule: A &#1048774; A + B. Using a LL parser, this rule is
impossible to handle.
a. True
b. False

Reference no: EM1328254

Questions Cloud

Action against employment claim : An employer makes an employees life miserable, as a result the employee feels that he/she can no longer tolerate the working conditions at the job therefore the employee quits. Is this an actionable employment claim?
Generate short-term and long-term information : How is forecasting used to generate short-term and long-term information about demand that affects capacity?
Detailed explanation to budgeting : How do you execute the time value of money concept to make decisions in your personal life?
Illustrate what kinds of changes in underlying : Illustrate what kinds of changes in underlying conditions can cause the supply and demand curves to shift
Why lexical analysis is separated from syntax analysis : What do you mean by the term aliasing mean?why Lexical analysis is separated from syntax analysis.
Explaining vision for group or organization : Briefly describe a possible group or organization to belong (now or belonged to in the past). If you were the leader of this group, what vision would you have for the group?
Increasing company capacity : What are some options that a company has in terms of increasing its capacity?
Explain it infrastructure : Explain IT Infrastructure and website Promotional Techniques and '508 Compliancy' and do you think this is important to Marketing
Compute the arc cross-price elasticity of demand : Compute the arc cross-price elasticity of demand among beverage sales and appetizer prices.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Vulnerabilities in purchasing through debit card

Recognize any potential vulnerabilities in act of making a purchase through the debit card, and which area of the CIA triad they apply to.

  Explain the osi model and data frames

Why should network architects concern themselves.

  Java program to declare an integer array and initializing it

Write down a complete Java program that declares an integer array, intArray, and initialize it to {1, 2, 3, 4, 5, 6, and 7}. The program must have the following methods:1) void displayOddPositions (). This method displays array elements in the odd..

  Speed routing protocol

Following question is related to SPEED routing protocol-Multiple speeds are computed in MAC layer. The forwarder with highest speed is selected on MAC layer feedback. This selection could not produce a shortest path.

  Utilize routers for connectivity devices instead of hubs

Utilize routers for connectivity devices instead of hubs

  Consider the ways in which you can optimize a file

consider the ways in which you can optimize a file in order to reduce file size and maintain quality. What factors would you consider.

  Sha-256 and rc4

SHA-256 (with 256-bit output) is more resistant to the attacks based on birthday paradox than SHA-1. Key reuse is deadly for the stream ciphers such as RC4.

  Pros and cons of application software in business

Operating system software for your personal PC: define What are the differences among Windows OSs

  Modify compound interest program

Modify compound interest program

  Diffe-hellman algorithm

Alice and Bob use the Diffe-Hellman to agree on a secret key. They select the prime p = 11, and a primitive root mod 11 g = 2.

  Application to computer science

Find the matrices that represent the relations.

  Utilizing the rsa protocol encrypt and decrypt messages

You are asked to hand-turn the RSA protocol in order to encrypt and decrypt the messages (utilizing smaller numbers than are used in the practice, so that calculations may be done through the hand).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd