Why lexical analysis is separated from syntax analysis

Assignment Help Computer Engineering
Reference no: EM1328254

1. What does the term aliasing mean?
a. Having two names for the same memory cell
b. Having two referencing methods for the same memory cell
c. Both a and b.
d. Neither a nor b.

2. The most rigorous means of describing the meaning of a program is
called _________ semantics.
a. dynamic
b. denotational
c. static
d. axiomatic

3. Lexical analysis is separated from syntax analysis because:
a. lexical analysis is less complex.
b. optimizing the lexical analyzer provides more benefits than
optimizing the syntax analyzer.
c. lexical analysis has to perform input/output operations and,
therefore, is platform dependent.
d. all of the above.

4. The output of _____ compilers must be linked to operating system
programs, especially __________ routines.
a. all; input/output
b. all; device drivers
c. some; input/output
d. some; device drivers

5. The extreme opposite of a compiler is known as a(n):
a. interpreter.
b. translator.
c. linker.
d. hybrid.

6. The following list contains steps that may/may not be part of the
process of compilation. Place the steps in the correct order that are
part of the compilation process, omitting those that are not part of
the compilation process.
i. lexical analysis
ii. linking
iii. formatting
iv. semantic analysis
v. optimization
vi. code generation
vii. syntax analysis
viii. loading
a. i, ii, iii, iv, v
b. iv, i, vii, v, ii
c. i, vii, vi, iv, v, ii
d. vii, i, iv, v, vi, iii
e. i, vii, iv, v, vi

7. The data structure built by a compiler that represents the
hierarchical syntactic structure of a given program is called a(n)
__________ tree.
a. parse
b. trace
c. syntax
d. module

8. How is Scheme opposite to Common Lisp?
a. Scheme is large and complex; Common Lisp is small.
b. Common Lisp is not an ANSI standard; Scheme is.
c. Scheme is exclusively statically scoped; Common Lisp supports
dynamic scoping.
d. Common Lisp is interpreted; Scheme is compiled.

9. The primary progenitor of COBOL was the programming language
known as:
a. Pseudocode.
b. Short Code.
c. Speedcode.
d. Flow-matic.

10. The C++ programming language is very popular because it is:
a. backward compatible with C.
b. object-oriented.
c. widely available.
d. all of the above.

11. Plankalkül included the following features except:
a. (recursive) record structures.
b. ones-complement notation floating point type.
c. iterative statement.
d. arrays.

12. For a large production application, a __________ language is most
likely to be used:
a. compiled
b. interpreted
c. hybrid
d. script

13. Java and Perl are examples of __________ languages.
a. compiled
b. interpreted
c. hybrid
d. script

14. What innovation introduced in ALGOL68 is often credited to Pascal?
a. user-defined data types
b. block statement
c. select statement
d. bit-string

15. The syntax analysis part of a compiler is known as a:
a. language generator.
b. language recognizer.
c. context free grammar.
d. assembler.

16. If the left-hand side (LHS) appears in the right-hand side (RHS) of a
rule, it is a(n):
a. error.
b. iteration.
c. meta-statement.
d. recursion.

17. A hierarchical structure that describes the syntactic structure of
sentences in a language is called a(n):
a. descendant chart.
b. family tree.
c. parse tree.
d. ancestor list.
e. none of the above.

18. An alternate term for lexical analyzer is:
a. pattern matcher.
b. parser.
c. pushdown automaton.
d. all of the above.

19. A concept of ________ means that a small number of primitive
constructs can be combined in a small number of ways to build the
control and data structures of the language.
a. simplicity
b. parsimony
c. relativity
d. orthogonality

20. The task of a bottom-up parser is to find the handle of any given
right sentential form that can be generated by its associated
grammar.
a. True
b. False

21. A logical rule that is assumed to be true is termed a(n):
a. axiom.
b. theorem.
c. corollary.
d. inference.

22. Using EBNF, the C selection statement is depicted as:
<selection> &#1048774; if (<expression>) <statement> [else <statement>];
Without brackets, how many BNF rules would be required to depict
the C selection statement?
a. 1
b. 2
c. 3
d. More than 3

23. With a von Neumann architecture, assignment is based on:
a. pipelining operations.
b. piping operations.
c. iterative operations.
d. functional operations.

24. The most common programming languages, dating back to the
1940s are called:
a. functional.
b. object-oriented.
c. rule-based.
d. imperative.

25. Consider the rule: A &#1048774; A + B. Using a LL parser, this rule is
impossible to handle.
a. True
b. False

Reference no: EM1328254

Questions Cloud

Action against employment claim : An employer makes an employees life miserable, as a result the employee feels that he/she can no longer tolerate the working conditions at the job therefore the employee quits. Is this an actionable employment claim?
Generate short-term and long-term information : How is forecasting used to generate short-term and long-term information about demand that affects capacity?
Detailed explanation to budgeting : How do you execute the time value of money concept to make decisions in your personal life?
Illustrate what kinds of changes in underlying : Illustrate what kinds of changes in underlying conditions can cause the supply and demand curves to shift
Why lexical analysis is separated from syntax analysis : What do you mean by the term aliasing mean?why Lexical analysis is separated from syntax analysis.
Explaining vision for group or organization : Briefly describe a possible group or organization to belong (now or belonged to in the past). If you were the leader of this group, what vision would you have for the group?
Increasing company capacity : What are some options that a company has in terms of increasing its capacity?
Explain it infrastructure : Explain IT Infrastructure and website Promotional Techniques and '508 Compliancy' and do you think this is important to Marketing
Compute the arc cross-price elasticity of demand : Compute the arc cross-price elasticity of demand among beverage sales and appetizer prices.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determining the vulnerability in product

Specify the ethical considerations included when the security professional contacts the vendor regarding vulnerability in their product.

  Integrated services architecture

Explain how has the integrated services architecture is being provided a solution to growing variety and volume of traffic experienced within the Internet and Intranets? Describe in scholarly detail.

  Computer hardware purchases over the next five years

what criteria will you use to make the purchases.

  What steps and tools are available for you to protect

What steps and tools are available for you to protect your family (especially your children) from these internet dangers?

  Database and characteristics of database

Explain the Database and describe the four characteristics of the database? Explain the Relational Database and generate a relational database for 5 employees.

  What are an ethical dilemmas associated

What are the ethical dilemmas associated with using facial recognition software? Is this kind of software any different from a store asking to see your drivers license when you use your credit card.

  How can the receiver detects the error

UDP uses 1's complement for its checksums. assume you have the following three 16-bit words 0100010001000100, 0101010101010101, 0011001100110011. What is the 1's complement of the sum of these 16-bit words.

  What are techniques for addressing security requirements

What are techniques for addressing security requirements? Which have a business relationship with the company?

  Developing the c++ code

Write down a C++ code in order to execute the following application: If you press on “Sum” button, summation of all the multiple of 4 numbers greater than 0 and less than 100 will be found and the result will be displayed in result edit box.

  Give an evaluation of whether the language met its goal

A short history of the language, including which languages it may have been based on and that languages it may have subsequently influenced. This may be part of the introduction or the background.

  Protecting the operating systems

Explain the relative benefit and de-merits of at least three different measures that are used in order to protect the operating systems.

  Define the principle for creating a database

Define the principle for creating a database

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd