Question

Q. Give one Trs example for a PDA (not found below) and add a comment in English next to it descr...

Q. Give one Trs example for a PDA (not found below) and add a comment in English next to it describing what it

means. If _____ then ______________.

Trs(q0, Ɛ, Z) = (q1, AZ) // push A

Trs(q0, b, Z) = (q0, BZ) // push B

Trs(q0, b, Z) = (q1, Ɛ) // pop Z

Trs(q0, b, Z) = (q1, Z) // replace Z with Z no change

Trs(q0, b, Z) = (q1, T) // pop Z and push T

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Result Input Accept Reject Reject Reject Reject Reject Accept Reject b ,Z; BZ abb aabb qo ba q1 Load Inputs Run Inputs Clear

The given PDA does not have any final stack so we assume that the string will be accepted when the stack is empty.

The only transition which leads to the empty stack is Trs(q0, b, Z) = (q1, Ɛ). So the PDA only accepts the string 'b'.

Add a comment
Know the answer?
Add Answer to:
Q. Give one Trs example for a PDA (not found below) and add a comment in English next to it descr...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Note: The question needs to be answered in "C Programming Languange ". And after the question fin...

    Note: The question needs to be answered in "C Programming Languange ". And after the question find 3 pages for needed informations. Spring CE4717 Language Processors Q1. Consider the following LEx program. return R1 return R2 return R3 return R4 return R5; return R6; IA-2a-z)[A-Za-z0-9]- -2 10-91+ 10-9a-EA-FI Ihi] [01] [01] 이삐 t Vtin) int main (void) int tcode; do f tcode -yylex()i printf ("token type td \"%s\"\n", tcode, yytext); ) while (tcode)i return 0; i. Explain the steps needed...

  • You will be writing a simple Java program that implements an ancient form of encryption known...

    You will be writing a simple Java program that implements an ancient form of encryption known as a substitution cipher or a Caesar cipher (after Julius Caesar, who reportedly used it to send messages to his armies) or a shift cipher. In a Caesar cipher, the letters in a message are replaced by the letters of a "shifted" alphabet. So for example if we had a shift of 3 we might have the following replacements: Original alphabet: A B C...

  • just one example/demonstration! Data needed to be calculated is in highlighted in green boxes. And I...

    just one example/demonstration! Data needed to be calculated is in highlighted in green boxes. And I highlighted in red an equation (not sure if thats what you use to calculate it) And ignore the lab instructions on completeing a graph!! I already know how to do that in excel, just curious how Ln (relative rate) and 1/T in K^-1 is calculated by hand* here is the rest of that lab leading up to the question as I know its typically...

  • C++. Need some help getting started. We will also have the following two functions: 1. A...

    C++. Need some help getting started. We will also have the following two functions: 1. A mutate function that randomly modifies a chromosome. 2. A crossover function that takes two chromosomes and splits each one at the same spot, then combines them together. Our genetic algorithm works by iterating over generations of chromosomes via the following process: 1. Generate random population. 2. Until we get an answer that is good enough, do the next steps in a loop: (a) Do...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT