Ginni has Published 1602 Articles

Construct a Predictive Parsing table for the following grammar & also check whether string id + id * id is accepted or not.

Ginni

Ginni

Updated on 08-Nov-2023 00:08:09

25K+ Views

Problem − Consider the following grammar − E → TE′ E′ → +TE′|ε T′ → FT′ T′ → FT′|ε F → (E)|id Solution − Step1− Elimination of Left Recursion & perform Left Factoring As there is no left recursion in Grammar so, we will proceed as it is. Also, there ... Read More

What is the role of the lexical analyzer in compiler design?

Ginni

Ginni

Updated on 07-Nov-2023 05:29:58

35K+ Views

The lexical analysis is the first phase of the compiler where a lexical analyser operate as an interface between the source code and the rest of the phases of a compiler. It reads the input characters of the source program, groups them into lexemes, and produces a sequence of tokens ... Read More

What are Computer Registers in Computer Architecture?

Ginni

Ginni

Updated on 07-Nov-2023 05:19:38

38K+ Views

Computer registers are high-speed memory storing units. It is an element of the computer processor. It can carry any type of information including a bit sequence or single data.A register should be 32 bits in length for a 32-bit instruction computer. Registers can be numbered relies upon the processor design ... Read More

How is RSA Algorithm Calculated?

Ginni

Ginni

Updated on 04-Nov-2023 01:49:38

20K+ Views

RSA is a cryptosystem for public-key encryption, and it is broadly used for securing sensitive information, specifically when being sent over an insecure network including the Internet.RSA algorithm is the most popular asymmetric key cryptographic algorithm depends on the mathematical fact that it is simply to discover and multiply large ... Read More

What are Instruction Formats?

Ginni

Ginni

Updated on 04-Nov-2023 01:40:19

22K+ Views

Instruction includes a set of operation codes and operands that manage with the operation codes. Instruction format supports the design of bits in an instruction. It contains fields including opcode, operands, and addressing mode.The instruction length is generally preserved in multiples of the character length, which is 8 bits. When ... Read More

What are Instruction Codes and Operands in Computer Architecture?

Ginni

Ginni

Updated on 03-Nov-2023 21:32:00

27K+ Views

A computer instruction is a binary code that determines the micro-operations in a sequence for a computer. They are saved in the memory along with the information. Each computer has its specific group of instructions.They can be categorized into two elements as Operation codes (Opcodes) and Address. Opcodes specify the ... Read More

What is the difference between Symmetric Key Cryptographic and Asymmetric Key Cryptography?

Ginni

Ginni

Updated on 03-Nov-2023 14:31:30

24K+ Views

Symmetric Key Cryptography In symmetric key cryptography, an individual key is used for both encryption and decryption. The sender needs the key to encrypt the plaintext and sends the cipher document to the receiver. The receiver used the similar key (or ruleset) to decrypt the message and recover the plaintext. ... Read More

What is Direct Mapping Process in Computer Architecture?

Ginni

Ginni

Updated on 03-Nov-2023 14:14:21

24K+ Views

Direct mapping is a procedure used to assign each memory block in the main memory to a particular line in the cache. If a line is already filled with a memory block and a new block needs to be loaded, then the old block is discarded from the cache.The figure ... Read More

What is LEX?

Ginni

Ginni

Updated on 03-Nov-2023 03:39:01

23K+ Views

It is a tool or software which automatically generates a lexical analyzer (finite Automata). It takes as its input a LEX source program and produces lexical Analyzer as its output. Lexical Analyzer will convert the input string entered by the user into tokens as its output.LEX is a program generator ... Read More

What is Virtual Memory?

Ginni

Ginni

Updated on 03-Nov-2023 03:27:48

30K+ Views

Virtual memory is the partition of logical memory from physical memory. This partition supports large virtual memory for programmers when only limited physical memory is available.Virtual memory can give programmers the deception that they have a very high memory although the computer has a small main memory. It creates the ... Read More

1 2 3 4 5 ... 161 Next
Advertisements