Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: Given the production:

S-> aSAb | Ab
A-> bbb
implement a complete pseudo code for a recursive descent parser. Assume scanner ( ) returns the next token.

problem 2: Give all needed first and follow sets needed to check if the grammar is LL(1). Is it?:

S -> aA | BB
A -> aaA | empty
B -> bB | Cd
C -> cA | dC

problem 3: A function returns a number, takes no arguments, and its body is a block. Functions are defined exactly like variables in the grammar except that function name is follow by a block. Show the grammar. Is the resulting grammar LL(1)?

problem 4: A function definition must be before the program token, and functions cannot be nested (exactly like in C). Every function has a return type (no void) and one argument. Function call is like in C, with an expression for the argument and the function call itself is an expression. Show the grammar. exs:

int fun1(long x)
/* same as in any block*/
long fun2(int x)
/** ... */
program xxx(void)
int x;

problem 5: Design unambiguous grammar to parse expressions involving +, -, *, / and unary -. Unary minus is strongest, followed by * and /(same precedence, right associative), then +, left associative, then finally -, left associative. Do not use any other operators, and use only number tokens.

problem 6: Assume function f ( ) has local variables a, b, and function g is nested inside of f ( ) and has local variable a. There is also a global variable c.

a) show the complete memory space for the program when it begins execution
b) show the stack after f ( ) is called, which subsequently calls g ( ), which calls itself once.
c) assume we have three statements in g ( )

stat1: c=10;
stat2: a=20;
stat3: b=30;
how would they be translated by the compiler: describe in words.

problem 7: Show the grammar for:

a) Allow global variables placed just before the first begin – these variables are optional and are listed separated by commas. For ex:

int x,y,z;
begin {etc.}

b) Also allow functions. Each function takes any number of arguments and always returns an integer. Parameter list is C-like, and the return statement (followed by an expression) is mandatory. Functions can be called in place of any expression. Functions are defined with a block, which is the same as the begin-end block in our grammar. Functions are defined separately, as in C but before the main program. Assume we have a multi-pass compiler so that prototypes is not an issue. The following is an ex program

int sum(int a, b) {paramater list is same as for globals}
int c;
return a+b;
int x,y;

problem 8: Given the program (like Pascal, with nested functions)

int x, y; {global}
function A
int z; {z is in A}
function B {B is defined inside A}
int x; {x is in B}
function C {C is inside B}
int x; {x is in C}
C(); {recursive call on C}
end; {end of C}
end; {end of B}
B(); { A calls B}
end; {end of A}

a) show ARs (activation Records) for A, B, C (show only local data, static and dynamic link}
b) What is in the persistent data space?
c) assume call to A() is done somewhere. Then, show that contents of the stack during the 3rd recursive call to C(). Make sure to fill out all info on the stack.
d) How would the left-hand-side variables in C()be translated by the compiler (describe in words, separately for each variable).

problem 9: Given the grammar, with lower case terminals and upper case nonterminals, and S the initial nonterminal

S -> aS | aA | bA
A -> Aa | ABb | cA
B -> bB | bdB | c

a) remove left recursion as needed, showing the modified grammar

b) left-factorize as needed what you get in a), showing the new grammar

c) Is the resulting grammar LL(1)? Argue piece by piece why it is or why it is not, showing all (and only the necessary) First and Follow sets.

problem 10: Assume the following static program structure, show the static chains and display when exactly five ARs are on the stack, assuming procedure A is called first.

proc A
begin /* proc A */
proc B
begin /* proc B */
proc C
begin /* proc C */
call A
end /* proc C */
call C
end /* proc B */
proc D
begin /* proc D */
call B
end /* proc D */
call D
end /* proc A */

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93892

Have any Question? 

Related Questions in Computer Engineering

1 what are cryptography and cryptanalysis2 what were some

1. What are cryptography and cryptanalysis? 2. What were some of the first uses of cryptography? 3. What is a key, and what is it used for? 4. What are the three basic operations in cryptography?

Analyze the manner in which a cirt plan fits into the

Analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.

1 what is the bandwidth of a signal that can be decomposed

1. What is the bandwidth of a signal that can be decomposed into five sine waves with frequencies at 0, 20, 50, 100, and 200 Hz? All peak amplitudes are the same. Draw the bandwidth. 2. A periodic composite signal with a ...

1 what special function does a cache server perform why is

1. What special function does a cache server perform? Why is this useful for larger organizations? 2. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.

Suppose one wishes to confirm that none of the files in the

Suppose one wishes to confirm that none of the files in the directory /usr/spool/lpd are worldreadable. a. What would the fourth field of the tripwire database contain? b. What would the second field of the RIACS databas ...

1 if you could what would you do to help create a national

1. If you could, what would you do to help create a national "security culture" in which everyone is more knowledgeable and proactive about threats to information security? 2. There have been several incidents of data th ...

Consider the scheme used to allow customers to submit their

Consider the scheme used to allow customers to submit their credit card and order information. Section states that the enciphered version of the data is stored in a spooling area that the Web server cannot acces ...

Assignment 1information security within organizations has

Assignment 1 Information security within organizations has evolved and has become much more complex.  In a written paper, answer the following questions:  How has computer security evolved into modern information securit ...

Using the web identify the chief information officer chief

Using the Web, identify the chief information officer, chief information security officer, and systems administrator for your school. Which of these individuals represents the data owner? Data custodian?

1 research and discuss the much-talked-about role of

1. Research and discuss the much-talked-about role of public-key authentication in the future of e-commerce. Is the role of PKI in authentication exaggerated? 2. Study the dial-in authentication mechanisms. What mechanis ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen