Differentiate b/w program translation and interpretation, Computer Engineering

Assignment Help:

Differentiate between program translation and program interpretation.

The program translation model makes the execution gap through translating a program written in a programming language, termed as the source program (SP), in an equivalent program into the machine or assembly language of the computer system, termed as the target program (TP). Subsequent diagram depicts the program translation model.

 

1945_program translation model.png

 

In a program interpretation process, the interpreter reads the source program and stores this in its memory. This bridges an execution gap without making a machine language program therefore we can say that the interpreter is a language translator. Although, this takes one statement of higher-level language at a time, translates this in machine language and executes this immediately. Translation and execution are continued for each statement. The absence of a target program means the absence of an outer interface of the interpreter. Thus language-processing activity of an interpreter can't be separated by its program execution activities. Therefore we can say that interpreter executes a program written into a programming language. In essence, the execution gap vanishes. Subsequent figure depicts the program interpretation model.

1000_program interpretation process.png

The program translation model characteristics are:

  • A program should be translated before this can be executed.
  • The translated program may be saved into a file. The saved program may be executed repeatedly.
  • A program should be retranslated subsequent modifications.

The program interpretation model characteristics are:

  • The source program is retained into the source form itself that is no target program form exists.
  • A statement is analyzed throughout its interpretation.

Related Discussions:- Differentiate b/w program translation and interpretation

Minmax search - artificial intelligence, MinMax Search Parents frequent...

MinMax Search Parents frequently get two children to share a cake by asking one to cut the cake and the other to select which half they want to eat. In this two player cake-sco

Decision table, Write a decision table that specifies the rules for the gam...

Write a decision table that specifies the rules for the game of checkers

Your worksheet and organizing the data, You presently work for an automotiv...

You presently work for an automotive parts supply store. Your company is growing, and is considering expansion. The company presently has three locations (North, South, and Central

Explain about the links and association, Links and Association Links a...

Links and Association Links and associations are the basic means used for establishing relationships among objects and classes of the system. In the next subsection we will di

Explain about the client/server computing, Explain about the Client/Server ...

Explain about the Client/Server Computing? Although there are different various configurations, various hardware and software platforms and even various network protocols into

What are two methods of modifying sap standard tables, What are two methods...

What are two methods of modifying SAP standard tables? Append Structures and Customizing Includes.

Develop an object-oriented design, Investigate the MIPS programmers model a...

Investigate the MIPS programmers model and develop an object-oriented design that will reflect aspects of the MIPS architecture. Consider the functional units of the architecture a

What is an identification method, An identification method notifies Robot h...

An identification method notifies Robot how to recognize the values to compare during record and playback.

Name the variable types of c, C provides a wide range of variable types. ...

C provides a wide range of variable types. Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Drawback of indirect addressing, Q. Drawback of indirect addressing? • ...

Q. Drawback of indirect addressing? • Drawback of this scheme is that it needs two memory references to fetch actual operand. First memory reference is to fetch the actual addr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd