1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
14

In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a

nd context-free, what is the difference, what is the scope (where are they applied), and how can the use of these grammars produce a higher level of program reliability. Does this higher level of reliability encourage complexity?
Computers and Technology
1 answer:
WARRIOR [948]3 years ago
8 0

Answer:

Lexical rules that are defined in case of regular grammar are simple and the notation is quite easy to understand.

Regular expression are useful for defining constructs of identifiers or constants. e.g. a|b etc.

In the case of context-free, grammar is not simple and deals with the productions.

Context-free are useful in describing the nested constructs like if-else etc which are not defined by regular expressions.

These produce a higher level of reliability as it provides a medium for generating syntactical as well as semantic data. The grammar is context-free is a little complex.

Explanation:

You might be interested in
What does scarcity force people to do?
Masteriza [31]
They force people to make choices.
5 0
3 years ago
Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Mak
Andrei [34K]

Answer:

The pseudocoded algorithm is as follows:

Procedure sumOdd(lotsOfNumbers):

    oddSum = 0

    len = length(lotsOfNumbers)

    for i = 0 to len - 1

         if lotsOfNumbers[i] Mod 2 != 0:

              OddSum = OddSum + lotsOfNumbers[i]

Print(OddSum)

Explanation:

This defines the procedure

Procedure sumOdd(lotsOfNumbers):

This initializes the oddSum to 0

    oddSum = 0

This calculates the length of the list

    len = length(lotsOfNumbers)

This iterates through the list

    for i = 0 to len-1

This checks if current list item is odd

         if lotsOfNumbers[i] Mod 2 != 0:

If yes, the number is added to OddSum

              OddSum = OddSum + lotsOfNumbers[i]

This prints the calculated sum

Print(OddSum)

6 0
3 years ago
What is the meaning of N.W.O​
Likurg_2 [28]

Answer:

The New World Order (NWO) in conspiracy theories is the hypothesis of a secretly emerging totalitarian world government.

8 0
3 years ago
Write down the importance of computers in this modern era of information technology in brief.​
Whitepunk [10]

Explanation:

The computer system is not a simple machine. It is like a very modern and highly complex calc ulator. It can do

Computers are critical for communication and are the centerpiece of information technology. The early 1990s saw the emergence of household Internet use, which eventually spurred common use of email, we bsites, blo gs, social network ing, video c hat and Voice-Over-Inte rnet Protocol.

4 0
2 years ago
Which of the following is an example of constructive criticism for a friend who speaks too softly?
Dmitry [639]
C is correct..

Please vote my answer branliest! Thanks.
8 0
4 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    8·2 answers
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • Brent is using customer reviews from a reputable online store to help him determine whether or not he should buy a particular la
    10·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • Please help.
    6·1 answer
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • Which tool ia used to create the world wide web?
    15·1 answer
  • Where do you find the instructions, learning objectives, evaluation and scoring for this aba assignment?.
    15·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
  • A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!