0

System Software and Compiler

Description: System software and compiler RelationshipsSystem Software and CompilersCompiler Design
Number of Questions: 25
Created by:
Tags: System software and compiler Relationships System Software and Compilers Compiler Design
Attempted 0/25 Correct 0 Score 0

Which of the following programs is used to manage the storage and processing resources of the computer and perform other management and monitoring functions?

  1. System support program

  2. System control program

  3. System development programs

  4. Distributive service support programs

  5. Program


Correct Option: B
Explanation:

This program is used to manage the storage and processing resources of the computer and performs other management and monitoring functions. System control programs also control the execution of the programs. Example of system control program is operating system.

Which of the following techniques takes the list of tokens produced by the lexical analysis and arranges the tokens in a tree structure?

  1. Semantic analysis

  2. Source code analysis

  3. Syntax analysis

  4. Control flow analysis

  5. Data flow analysis


Correct Option: C
Explanation:

This analysis takes the list of tokens produced by the lexical analysis and arranges the tokens in a tree structure.

Which of the following programs is used to perform a specific task for the computer user such as sales analysis, payroll analysis etc.?

  1. Application software program

  2. System support program

  3. System development program

  4. Object program

  5. Distributed service program


Correct Option: A
Explanation:

This program is a program that is used to perform specific task for the computer user such as sales analysis, payroll analysis etc..

Which of the following tools is a software system that accepts the specification of a program to be generated and generates a program in the target PL?

  1. System monitor

  2. Program generator

  3. Process monitor

  4. Client side diagnostic tool

  5. Burp scanner


Correct Option: B
Explanation:

This tool is a software system that accepts the specification of a program to be generated and generates a program in the target PL. With a program generator a user only be required to specify the steps or rules required need to write any code.

Which of the following techniques analyses the syntax tree to determine if the program violates certain consistency requirements?

  1. Semantic analysis

  2. Program execution activity

  3. Caching

  4. Type checking

  5. Control flow analysis


Correct Option: D
Explanation:

In a statically typed language immediately following parsing phase is the type checking phase.This technique analyses the syntax tree to determine if the program violates certain consistency requirements.

Which of the following techniques is used to represent the automatic generation of a program and source language is a specification language of an application domain?

  1. Program execution activity

  2. Program generator domain

  3. Program generation activity

  4. Pseudo-operations

  5. Caching


Correct Option: C
Explanation:

This technique is used to represent the automatic generation of a program and source language is a specification language of an application domain.

Which of the following programs is used to execute from a storage area other than the one designated for it at the time of its coding or translation?

  1. System support program

  2. System development programs

  3. Program

  4. Distributed service support program

  5. Relocatable program


Correct Option: E
Explanation:

This program is used to execute from a storage area other than the one designated for it at the time of its coding or translation. Such relocation is possible because of the availability of information about the address senstive instruction in it.

Which of the following tools incorporates a context search which permits the user to indicate a position in the text by specifying a character string?

  1. Screen editor

  2. Program translator

  3. Line editor

  4. System integrator

  5. Log writer


Correct Option: C
Explanation:

This tool incorporates a context search which permitted the user to indicate a position in the text by specifying a character string.

In which of the following object file formats, the data also may be incomplete because of unresolved references to labels in other files?

  1. Text segment

  2. Relocation information

  3. Index segment

  4. Data segment

  5. Allocation


Correct Option: D
Explanation:

In this object file format, the data also may be incomplete because of unresolved references to labels in other files.

In which of the following techniques, there are some address dependent locations in the program and address constant must be adjusted according to allocated space?

  1. Relocation

  2. Program execution activity

  3. Allocation

  4. Program translation

  5. Caching


Correct Option: A
Explanation:

In this technique, there are some address dependent locations in the program and address constant must be adjusted according to allocate space.

Which of the following object file formats associates addresses with external labels in the source file and lists unresolved references?

  1. Literal table

  2. Symbol table

  3. Text segment

  4. Relocation information

  5. Object program


Correct Option: B
Explanation:

This object file format associates addresses with external labels in the source file and lists unresolved references.

Which of the following programs is stored on the system residence device to perform a specific standard function?

  1. Object program

  2. System support program

  3. System development program

  4. Distributed service support program

  5. Subroutine


Correct Option: E
Explanation:

A subroutine is a sequence of program instruction that perform a specific task.This program is stored on the system residence device to perform a specific standard function.

Which of the following object file formats is used to describe the size and position of the other peices of file?

  1. Object program

  2. Object file header

  3. Text segment

  4. Relocation information

  5. Proc-Type


Correct Option: B
Explanation:

This object file format is used to describe the size and position of the other pieces of file. The overall information about the file, such as size of the code, name of the source file it was translated from and creation data is stored in object header file.

Which of the following techniques is defined as the process of merging many object modules to form a single machine language program?

  1. Linking

  2. Allocation

  3. Relocation information

  4. Pseudo operation

  5. Caching


Correct Option: A
Explanation:

The process of merging many object modules to form a single machine language program is known as linking.

By using which of the following tools, context searches and editing operations can be performed uniformly through the text?

  1. Screen editor

  2. Stream editor

  3. Client side diagnostic tool

  4. Log writer

  5. Program translator


Correct Option: B
Explanation:

By using this tool, context searches and editing operations could be performed uniformly through the text.

In which of the following object file formats, the debugger can find which instruction addresses correspond to lines in a source file and print the data structures in readable form?

  1. Debugging

  2. Automated debugging

  3. Debugging information

  4. Relocation information

  5. Text segment


Correct Option: C
Explanation:

In this object file format, the debugger can find which instruction addresses correspond to lines in a source file and print the data structures in readable form.

In which of the following techniques, the text is read and divided into tokens, each of which corresponds to a symbol in the programming language?

  1. Semantic analysis

  2. Permission analysis

  3. Control flow analysis

  4. Data flow analysis

  5. Lexical analysis


Correct Option: E
Explanation:

The task of scanning source statement, recognising and classifing the various tokens is known as lexical analysis. In this analysis, the text is read and divided into tokens and each of which corresponds to a symbol in the programming language.

Which of the following programs contains information regarding its address sensitivity and the code to make use of this information to relocate the address sensitive part of its code?

  1. Object program

  2. System support program

  3. System development program

  4. Self relocating program

  5. Distributed service support program


Correct Option: D
Explanation:

This program relocates its own address-dependent instruction and data when run and is therefore capable of being loaded into memory at any address. This program not only contains information regarding its address sensitivity but also the code to make use of this information to relocate the address sensitive part of its code.

Which of the following tools is used to transform human readable specification of tokens and white spaces into efficient programs?

  1. Program translator

  2. Program generator domain

  3. Client side diagnostic tool

  4. Process monitor

  5. Lexer generator


Correct Option: E
Explanation:

This tool is used to transform human readable specification of tokens and white spaces into the efficient program.

In which of the following techniques, the storage requirement of a particular constituent is calculated from various information items like its length and dimensionality stored in the tables?

  1. Data flow analysis

  2. Semantic analysis

  3. Source code analysis

  4. Synthesis analysis

  5. Program execution activity


Correct Option: D
Explanation:

In this technique, the storage requirement of a particular constituent is calculated from various information items like its length and dimensionality stored in the tables.

Which of the following tools can be constructed to recognise virtually all programming language constructs for which context free grammers can be written?

  1. Program translator

  2. Program generator domain

  3. LR parser

  4. Program interpreter

  5. System monitor


Correct Option: C
Explanation:

This tool can be constructed to recognise virtually all programming language constructs for which context free grammers can be written.

Which of the following techniques is used to locate a program in an appropriate area of the main storage of a computer when it is to be executed?

  1. Loading

  2. Caching

  3. Program execution activity

  4. Pseudo operation

  5. Allocation


Correct Option: A
Explanation:

This technique is used to locate a program in an appropriate area of the main storage of a computer when it is executed.

Which of the following programs does not contain information about address sensitivity of parts of the programs?

  1. Object program

  2. Non relocatable program

  3. System support program

  4. System development program

  5. Distributed service support program


Correct Option: B
Explanation:

This program does not contain the information about address sensitivity of the parts of the program.

Which of the following tools takes the input as a string of individual letters and divides the string into tokens?

  1. Program translator

  2. Program generator domain

  3. Lexical analyser

  4. Protocol analyser

  5. Client side diagnostic tools


Correct Option: C
Explanation:

This tool takes input the string of individual letters and divide the string into tokens.

Which of the following techniques arises due to the difference between the manner in which a software designer describes the ideas concerning the behavior of a software and the manner in which these ideas are implemented in a computer system?

  1. Program execution activity

  2. Language processing activity

  3. Program generator domain

  4. Allocation

  5. Program translation


Correct Option: B
Explanation:

This technique arises due to the differences between the manner in which a software designer describes the ideas concerning the behaviour of a software and the manner in which these ideas are implemented in a computer system.

- Hide questions