PCD 2m
PCD 2m
2 Marks Q&A
1. What is a compiler?
A compiler is a program that reads a program written in one language –the source language and
translates it into an equivalent program in another language-the target language. The compiler reports
to its user the presence of errors in the source program.
The analysis part breaks up the source program into constituent pieces and creates an intermediate
representation of the source program.
/
The synthesis part constructs the desired target program from the intermediate representation.
k
3. List the subparts or phases of analysis part.
. t
Analysis consists of three phases:
b e
Linear Analysis.
t u
Hierarchical Analysis.
Semantic Analysis. s e
/ c
/
4. Depict diagrammatically how a language is processed.
:
Skeletal source program
t p
↓
h t
Preprocessor
Source program
Compiler
http://csetube.weebly.com/
↓
Assembler
Single- pass
Multi-pass
Load-and-go
http://csetube.weebly.com/
Debugging or optimizing
A symbol table is a data structure containing a record for each identifier, with fields for the attributes of
the identifier. The data structure allows us to find the record for each identifier quickly and to store or
retrieve data from that record quickly.
Whenever an identifier is detected by a lexical analyzer, it is entered into the symbol table. The
attributes of an identifier cannot be determined by the lexical analyzer.
Preprocessors
k /
Assemblers
. t
Loaders and Link-Editors b e
t u
e
10. List the phases that constitute the front end of a compiler.
s
c
The front end consists of those phases or parts of phases that depend primarily on the source language
/
/
and are largely independent of the target machine. These include
:
p
Lexical and Syntactic analysis
t
h t
The creation of symbol table
Semantic analysis
A certain amount of code optimization can be done by the front end as well. Also includes error handling
that goes along with each of these phases.
The back end of compiler includes those portions that depend on the target machine and generally
those portions do not depend on the source language, just the intermediate language. These include
Code optimization
http://csetube.weebly.com/
Code generation, along with error handling and symbol- table operations.
Systems to help with the compiler-writing process are often been referred to as compiler-compilers,
compiler-generators or translator-writing systems.
Largely they are oriented around a particular model of languages , and they are suitable for generating
compilers of languages similar model.
Parser generators
k /
Scanner generators
. t
Syntax-directed translation engines
b e
Automatic code generators
t u
Data-flow engines
s e
14. Differentiate tokens, patterns, lexeme. / c
: /
p
Tokens- Sequence of characters that have a collective meaning.
t
h t
Patterns- There is a set of strings in the input for which the same token is produced as
output. This set of strings is described by a rule called a pattern associated with the
token
Union - L U M ={s | s is in L or s is in M}
http://csetube.weebly.com/
Positive Closure – L+ ( one or more concatenations of L)
17. Mention the various notational shorthands for representing regular expressions.
k /
Character classes ([abc] where a,b,c are alphabet symbols denotes the regular
expressions a | b | c.)
. t
Non regular sets b e
t u
18. What is the function of a hierarchical analysis?
s e
collective meaning. / c
Hierarchical analysis is one in which the tokens are grouped hierarchically into nested collections with
: /
Also termed as Parsing.
t p
t
19. What does a semantic analysis do?
h
Semantic analysis is one in which certain checks are performed to ensure that components of a program
fit together meaningfully.
20. List the various error recovery strategies for a lexical analysis.
http://csetube.weebly.com/
Inserting a missing character
UNIT 2
1. Define parser.
Hierarchical analysis is one in which the tokens are grouped hierarchically into nested collections with
collective meaning.
T is a set of terminals
S is a start symbol
http://csetube.weebly.com/
Production rules are given in the following form
Derivation from S means generation of string w from S. For constructing derivation two things are
important.
ii) Choice of rule from production rules for corresponding non terminal.
/
i) either leftmost derivation – leftmost non terminal in a sentinel form
k
t
ii) or rightmost derivation – rightmost non terminal in a sentinel form
.
6. Define ambiguous grammar.
b e
t u
A grammar G is said to be ambiguous if it generates more than one parse tree for some
sentence of language L(G).
s e
/ c
i.e. both leftmost and rightmost derivations are same for the given sentence.
: /
7. What is a operator precedence parser?
t p
h t
A grammar is said to be operator precedence if it possess the following properties:
2. There should not be any production rule possessing two adjacent non terminals at the right
hand side.
http://csetube.weebly.com/
3. LR parsers work using non backtracking shift reduce technique yet it is
efficient one.
Canonical LR parser
The following are the problems associated with top down parsing:
Backtracking
k /
Left recursion
. t
Left factoring
b e
Ambiguity t u
s e
c
11. Write the algorithm for FIRST and FOLLOW.
/
FIRST
: /
t p
1. If X is terminal, then FIRST(X) IS {X}.
h t
2. If X → ε is a production, then add ε to FIRST(X).
3. If X is non terminal and X → Y1,Y2..Yk is a production, then place a in FIRST(X) if for some i , a
is in FIRST(Yi) , and ε is in all of FIRST(Y1),…FIRST(Yi-1);
FOLLOW
1. Place $ in FOLLOW(S),where S is the start symbol and $ is the input right endmarker.
http://csetube.weebly.com/
12. List the advantages and disadvantages of operator precedence parsing.
Advantages
Disadvantages
1. The operator like minus has two different precedence(unary and binary).Hence it is hard to handle
tokens like minus sign.
/
Ambiguity can be eliminated by means of dangling-else grammar which is show below:
k
stmt → if expr then stmt
. t
| if expr then stmt else stmt
b e
| other
t u
s e
14. Write short notes on YACC.
/ c
/
YACC is an automatic tool for generating the parser program.
:
p
YACC stands for Yet Another Compiler Compiler which is basically the utility available from UNIX.
t
h t
Basically YACC is LALR parser generator.
If w is a sentence of the grammar at hand, then w = γn, where γn is the nth right-sentential form
of some as yet unknown rightmost derivation
http://csetube.weebly.com/
An LR(0) item of a grammar G is a production of G with a dot at some position of the right side.
Thus, production A → XYZ yields the four items
A→.XYZ
A→X.YZ
A→XY.Z
A→XYZ.
The set of prefixes of right sentential forms that can appear on the stack of a shift-reduce parser are
called viable prefixes. An equivalent definition of a viable prefix is that it is a prefix of a right
form. k /
sentential form that does not continue past the right end of the rightmost handle of that sentential
. t
18. Define handle.
b e
t u
A handle of a string is a substring that matches the right side of a production, and whose reduction
to the nonterminal on the left side of the production represents one step along the reverse of a
rightmost derivation.
s e
/ c
A handle of a right – sentential form γ is a production A→β and a position of γ where the string β
/
may be found and replaced by A to produce the previous right-sentential form in a rightmost
:
p
derivation of γ. That is , if S =>αAw =>αβw,then A→β in the position following α is a handle of αβw.
t
t
19. What are kernel & non-kernel items?
h
Kernel items, whish include the initial item, S'→ .S, and all items whose dots are not at the left
end.
Phrase level error recovery is implemented by filling in the blank entries in the predictive parsing
table with pointers to error routines. These routines may change, insert, or delete symbols on
the input and issue appropriate error messages. They may also pop from the stack.
http://csetube.weebly.com/
UNIT 3
Syntax tree
Posix
k /
Three address code
. t
3. Define backpatching. b e
t u
s e
Backpatching is the activity of filling up unspecified information of labels using appropriate
semantic actions in during the code generation process.In the semantic actions the functions
c
used are mklist(i),merge_list(p1,p2) and backpatch(p,i)
/
: /
4. Mention the functions that are used in backpatching.
t p
mklist(i) creates the new list. The index i is passed as an argument to this function
t
where I is an index to the array of quadruple.
h
merge_list(p1,p2) this function concatenates two lists pointed by p1 and p2. It returns
the pointer to the concatenated list.
5. What is the intermediate code representation for the expression a or b and not c?
The intermediate code representation for the expression a or b and not c is the three address
sequence
t1 := not c
t2 := b and t1
http://csetube.weebly.com/
t3 := a or t2
The three address statements can be implemented using the following methods.
Triples : the use of temporary variables is avoided by referring the pointers in the
symbol table.
Indirect triples : the listing of triples has been done and listing pointers are used
instead of using statements.
1. S → if E then S1 k /
. t
E.true := new_label()
b e
E.false :=S.next
t u
S1.next :=S.next
s e
/ c
S.code :=E.code | | gen_code(E.true ‘: ‘) | | S1.code
2. S → if E then S1 else S2 : /
t p
h t
E.true := new_label()
E.false := new_label()
S1.next :=S.next
S2.next :=S.next
UNIT 4
http://csetube.weebly.com/
The code generator should produce the correct and high quality code. In other words,
the code generated should be such that it should make effective use of the resources
of the target machine.
Define and use – the three address statement a:=b+c is said to define a and to use b
and c.
Live and dead – the name in the basic block is said to be live at a given point if its
value is used after that point in the program. And the name in the basic block is
said to be dead at a given point if its value is never used after that point in the
program.
k /
3. What is a flow graph?
. t
blocks. b e
A flow graph is a directed graph in which the flow control information is added to the basic
t u
e
The nodes to the flow graph are represented by basic blocks
s
c
The block whose leader is the first statement is called initial block.
/
: /
There is a directed edge from block B1 to block B2 if B2 immediately follows B1 in the
p
given sequence. We can say that B1 is a predecessor of B2.
t
t
4. What is a DAG? Mention its applications.
h
Directed acyclic graph(DAG) is a useful data structure for implementing transformations on basic
blocks.
DAG is used in
Determining which names are used inside the block and computed outside the
block.
Determining which statements of the block could have their computed value
outside the block.
http://csetube.weebly.com/
Simplifying the list of quadruples by eliminating the common su-expressions and not
performing the assignment of the form x := y unless and until it is a must.
Peephole optimization is a simple and effective technique for locally improving target code. This
technique is applied to improve the performance of the target program by examining the short
sequence of target instructions and replacing these instructions by shorter or faster sequence.
Algebraic simplification
k /
Use of machine idioms
. t
7. How do you calculate the cost of an instruction?
b e
t u
The cost of an instruction can be computed as one plus cost associated with the source and
s e
destination addressing modes given by added cost.
MOV R0,R1 1
/ c
: /
MOV R1,M 2
t p
t
SUB 5(R0),*10(R1) 3
h
8. What is a basic block?
A basic block is a sequence of consecutive statements in which flow of control enters at the
beginning and leaves at the end without halt or possibility of branching.
Eg. t1:=a*5
t2:=t1+7
t3:=t2-5
t4:=t1+t3
t5:=t2+b
http://csetube.weebly.com/
9. How would you represent the following equation using DAG?
a:=b*-c+b*-c
UNIT 5
1. Mention the issues to be considered while applying the techniques for code optimization.
The improvement over the program efficiency must be achieved without changing the
algorithm of the program.
s e
machine for the instruction set used and addressing modes used for the instructions
to produce the efficient target code.
/ c
: /
The machine independent optimization is based on the characteristics of the
programming languages for appropriate programming structure and usage of
p
efficient arithmetic properties in order to reduce the execution time.
t
h t
4. What are the different data flow properties?
Available expressions
Reaching definitions
Live variables
Busy variables
Static allocation
http://csetube.weebly.com/
Stack allocation
Heap allocation
The activation record is a block of memory used for managing the information needed by a
single execution of a procedure. Various fields f activation record are:
Temporary variables
Local variables
Control link
k /
Access link
. t
Actual parameters b e
t u
Return values
s e
7. What is dynamic scoping?
/ c
/
In dynamic scoping a use of non-local variable refers to the non-local data declared in most recently
:
t p
called and still active procedure. Therefore each time new findings are set up for local names called
procedure. In dynamic scoping symbol tables can be required at run time.
h t
8. Define symbol table.
Symbol table is a data structure used by the compiler to keep track of semantics of the variables. It
stores information about scope and binding information about names.
Code motion is an optimization technique in which amount of code in a loop is decreased. This
transformation is applicable to the expression that yields the same result independent of the
number of times the loop is executed. Such an expression is placed before the loop.
The source code should be such that it should produce minimum amount of target code.
http://csetube.weebly.com/
There should not be any unreachable code.
The optimizing compilers should apply following code improving transformations on source
language.
h t
The hash function should result in uniform distribution of names in symbol table.
The hash function should be such that there will be minimum number of collisions. Collision is such a
situation where hash function results in same location for storing the names.
http://csetube.weebly.com/