Identify tokens in the grammar before the implementation

Assignment Help Computer Engineering
Reference no: EM132272003

Statement → (IF_statement | IFELSE_statement)

IF_statement → if (Condition) {Exp}

IFELSE_statement → if (Condition) {Exp} else { Exp }

Condition → ID Sign Term

Exp→ (Term + Term) | (Term-Term) Term→[0-9]+

ID→ ([A-Z] | [a-z])+

Sign→ > | < | ==

This is a grammar for IF statement

Your task in homework 02 is:
• Fixing the problems in the previous grammar
• Building a parser based on the previous grammar

Task 1:

Show the problems in the previous grammar and then Fix them

Task 2:
Implement a predictive parser using JavaCC

Hints:
• You must identify the tokens in the grammar before the implementation
• If and else are keywords

Take screenshots for:
• Lexical specification part (All tokens definition)
• Parser part
• Output of testing: :if (Ab>10) {1+2}
• Output of testing: :if (Ab<20) {1+2} else {1-2}
• Output of testing: :if (Ab<30) else {1-2}

Attachment:- Compiler Construction.rar

Reference no: EM132272003

Questions Cloud

What is the asset beta : The firm's market value debt to equity ratio is .6. Template has a zero tax rate. What is the asset beta?
What is the most common implementation : What is the most common implementation? What is the most expensive? Using a Web browser, search for other examples. How do they differ?
Rate of interest on debt : The firm is considering the following three alternative amounts of debt which are given along with the required expected rate of return on equity
Conduct regression and chi-squared test of independency : Explore the use of statistical software in data analysis through hands-on applications. Conduct regression and chi-squared test of independency.
Identify tokens in the grammar before the implementation : CPCS302 - Compiler Construction - king Abdulaziz University - Building a parser based on the previous grammar - Implement a predictive parser using JavaCC
Describe advantages of using custom threat mitigation : Describe advantages and disadvantages of using custom threat mitigation approaches.
Consider two mutually exclusive machines : Consider two mutually exclusive machines: A and B. Acquisition cost of A is $1,000 and of that of B is $1,800. Assume that both machines produce identical
Elaborate on a scenario when it would be acceptable to use : Elaborate on a scenario when it would be acceptable to use the "wait and see" approach to manage risk.
Calculate the rate of return on firm assets : At the output level of 5,000 units, calculate the rate of return on firm's assets, the degree of its operating leverage, earnings per share, the rate of return

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd