Evolution of imperative programming languages

Assignment Help Basic Computer Science
Reference no: EM131061849

Question:

Question 1

(a) In the evolution of imperative programming languages, features have been introduced, whilst other features have been removed or deprecated in 'successor' languages.

Discuss, with critical comment, the motivations for these changes that have been made to imperative programming languages. Concentrate your discussion on issues of reliability and maintenance, both corrective and enhancement of applications that are developed in these languages.

In your discussion use a range of imperative programming languages (For example: COBOL, BCPL, C, C++, Java etc.) to illustrate points that you make. DO NOT consider any issues or constructs that directly or indirectly make use of concurrency.

(b) Discuss, using an appropriate notation, how it is possible to 'port' a compiler for a programming language to a new host machine which has a different architecture from its existing environment. The effort required to port the compiler should be considerably less that the effort required to create the original version of the compiler.

In your discussion of the process involved, describe carefully the overall structure of the compiler in relationship to the need to facilitate the 'port' of the compiler to a new machine.

Question 2:

(a) What is transactional memory? Discus, how transactional memory may be implicitly used in a Java program to improve performance in programs that consist of several concurrently executing threads that share access to common data structures.
Remember, the use of transactional memory will not require any changes to the physical source code of a program.

(b) Discuss, with critical comment, the extent to which the new features of Java 8 allow a programmer to construct a program that will make use of multiple cores without explicitly having to use threads in the solution. Use appropriate examples to illustrate the points that you make.

(c) In a computer game, a high priority thread is used to process user interactions  with the system. This high priority thread accesses a shared data structure (aSDS) which is also accessed by a low priority thread in the system. To prevent corruption of the data, a lock is used to prevent more than 1 concurrent access to the shared data structure (aSDS). The low priority thread continually checks the state of the game and performs low level housekeeping tasks including the re-organisation of the shared data structure (aSDS). The re-organisation of the shared data structure (aSDS) will occur every second, however, it will take under 5 CPU milliseconds to run.

The above system will always allow a higher priority thread to run even if it has to pre-empt a running lower priority thread. Recently a medium priority thread has been introduced that adds some artificial intelligence to the game. This medium priority task takes some time to run (1-5 seconds), but can be pre-empted by the high priority thread that controls the user interactions. The medium priority thread does not access the shared data structure (aSDS). Unfortunately the observed effect by users of the new version of the game is
that they occasionally experience long pauses of several seconds when it is not possible to interact with the game.

Suggest what the most likely cause of this problem is in the new 'improved' version of the game. Propose a solution to resolve the issue and carefully comment on why it works.

Question 3:

(a) For systems that require authentication of users of the system, what steps would you advise developers and users of the system to take to ensure as far as possible that the users who are authenticated by the system really are the person that they claim to be? For each suggestion, justify your selection with critical comment about what issue or issues is being addressed. In addition, what other issues would you advise the developers to investigate, to ensure the confidentiality and security of the data stored on the system?

(b) The TCP protocol provides a reliable stream-oriented communications medium, and yet it uses the IP protocol suite, an unreliable packet-oriented medium. Explain what 'reliable' means in this context, and describe how TCP's reliable stream-oriented service is implemented. Then explain and critically comment on the performance consequences of using TCP to communicate between a client and a server when:

1) A long distance between the client and the server is involved.

2) A highly interactive program is used on the server, for example, a cloud based editor which often involves the sending of single characters from the client to the cloud based editor. In each case above explain what can be/ is done to alleviate the impact on performance.

Reference no: EM131061849

Questions Cloud

What are the performance considerations : What are the performance considerations? What are the security requirements? Should we buy or build? What solutions does our competition leverage?
What is historic preservation and why is it important today : Who is Save Our Heritage Organisation (SOHO), what is their mission?. PLEASE do not "cut and paste" - use your own words to describe this historic preservation organization. Give at least three examples of HOW they educate, advocate and preserve i..
Problem regarding the audio and html5 : HTML5 supports several formats of audio. However, there is no single format that is compatible with every browser. Analyze two different ways that this issue can be addressed. Select the best solution for this issue and explain why you chose it.
Benefits and drawbacks of the design : Indicate any advantages and disadvantages as well as the benefits and drawbacks of the design. Include information about the ISP.
Evolution of imperative programming languages : In the evolution of imperative programming languages, features have been introduced, whilst other features have been removed or deprecated in 'successor' languages.
Why they are used and why can''t individual biasing work : What is the use of current mirrors in the models of amplifiers?
Construct the routing table of router r3 : Construct the routing table of router R3 for this configuration
Identify slos for the program : Explain what impact the use of SLOs has on the student experience. Explain what impact the use of SLOs has on program evaluation and revision.
Conduct an hour long observation of the child : Conduct an hour long observation of the child you have chosen to study to create your comprehensive guidance plan.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd