Question

⑤ COMPILER 22. WHICH OF THE FOLLOWING TRA NSLATES AND EXCUTES PROGRAM ST ATEMENTS IN SEQUENCE, INSTEAD OF HAVING SEPARATE TRA
i need this answer asap
0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER 22:

B. INTERPRETER - It is a translator that reads and converts line by line.

ANSWER 23:

C. BYTECODE

ANSWER 24:

A. PROCESS MANAGEMENT - It keeps tracks of all the steps and process that are running during program execution

ANSWER 25:

B. MEMORY MANAGEMENT

Add a comment
Know the answer?
Add Answer to:
i need this answer asap ⑤ COMPILER 22. WHICH OF THE FOLLOWING TRA NSLATES AND EXCUTES...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • plz answer them asap 27. With load time binding the program cannot be relocated (T/F) 28....

    plz answer them asap 27. With load time binding the program cannot be relocated (T/F) 28. Using Dynamic Link Libraries (DLL), makes the program modules smaller (T/F) 29. Interpreted languages are faster than compiled languages (T/F) 30. When we discussed Database software, we discussed a Race condition. Briefly describe that a Race condition is and how it can be solved. 15 pts) 31. The output from the Java compiler is a binary class file that is executed by a A....

  • 1. Which of the following statements is NOT correct about high-level languages? a. A program written...

    1. Which of the following statements is NOT correct about high-level languages? a. A program written in a high-level language is called a source program or source code. b. A source program can be executed directly on computers. c. Other programming tools can be used to translate a source program into machine code for execution. d. A compiler can translate the entire source program into machine-code file.

  • State transition diagram used for operating system management of the Process Control Block has the following...

    State transition diagram used for operating system management of the Process Control Block has the following states A New (Create)– In this step, process is about to be created but not yet created, it is the program which is present in secondary memory that will be picked up by OS to create the process. Ready -> Ready to run. After creation of a process, the process enters the ready state i.e. the process is loaded into the main memory. The...

  • C++ Please I need answer ASAP i) Which of the following statements in a client program...

    C++ Please I need answer ASAP i) Which of the following statements in a client program correctly initializes a variable day/ of type DateType to 10/12/90? A. Initialize(10, 12, 90); B. day1.month- 10; day1.day-12; day1.year-90; C. day1.Initialize(10, 12, 90); D. cin>>month>>day>>year; E. The client program cannot initialize the date. ii) The members of a class are public by default. A) True B) False iv) The member variables and functions declared following the word_(1.) are accessible only to the class's member...

  • Which of the following is NOT correct about compilers and interpreters? Select one: a. Compilers and...

    Which of the following is NOT correct about compilers and interpreters? Select one: a. Compilers and interpreters are programs. b. Compilers and interpreters can translate high-level language into machine language. c. After translated, a program can run without a compiler. d. After translated, a program can run without an interpreter.

  • Comments used to document code should: A. be used as little as possible B. be insightful...

    Comments used to document code should: A. be used as little as possible B. be insightful and explain what the instruction's intention is C. only be included in code that is difficult to understand D. be used to define variables whose names are not easy to understand E. not be included with the program 2 points    QUESTION 2 The main method for a Java program is defined by: A. public static main( ) B. public static main(String[ ] args);...

  • C++ code... Need help asap QUESTION 2 (20 MARKS) The following program shows a simple example...

    C++ code... Need help asap QUESTION 2 (20 MARKS) The following program shows a simple example to calculate average of three marks. Explain how the program is working as well as data management in your memory. You can illustrates this by using table or drawing. The sample output is illustrated in Figure Q2. 1 #include <iostream> 2 using namespace std 3 float calculateAverage (int* marks) int sum=0; float average, for (int İzd ;ia;i++) sumesum+( (marks+i)12 10 11 average float (sum)...

  • Which of the following about virtual memory is not true? A) Virtual memory needs paging hardware...

    Which of the following about virtual memory is not true? A) Virtual memory needs paging hardware B)Virtual Memory uses storage device to extend the physical main memory C)The optimal replacement strategy is the most practical strategy D)Multiple process can share pages What should we do when having a page fault (Multiple answers)? A)Skip the machine instruction causing the page fault. B)Update the page table after loading the missing page C) Switch to a process that does not have page faults...

  • 1. What is the largest power of two to which the following numbers are aligned? a....

    1. What is the largest power of two to which the following numbers are aligned? a. 11010101000002 b. 0xA3318 c. 0x2F379C d. 0x7043000 2.  How many address lines would be needed for each of the following amounts of memory space? a. 819,200 b. 100 MB 3. How many 4K blocks of physical memory would be required after the program malloc’s 2 MB of virtual memory?

  • Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

    Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT