Question

In: Computer Science

The application of syntax analysis techniques in query processing system such as SQL You should cover:...


The application of syntax analysis techniques in query processing system such as SQL

You should cover:
1) What is the problem?
2) What is the compiler construction techniques used to solve the problem
3) How to solve the problem using the compiling techniques.

Solutions

Expert Solution

The application of syntax analysis techniques in query processing system such as SQL plays an important role in ensuring if the syntax of the query is correct.

The syntax analyser is accepting query from users, parsing it into the tokens and then analysing tokens to ensure they comply with all the necessary rules. If any error is detected in query that is submitted, it is rejected and an error code is shown as per the specific error in the query.

Now the question is how the errors are detected!

Errors are detected by the syntax analyser by comparing the input query with the standard query rules as shown below:

QUERY: SELECT_CLAUSE + FROM_CLAUSE + WHERE_CLAUSE
SELECT_CLAUSE: ‘SELECT’ + <COLUMN_LIST>
FROM_CLAUSE : ‘FROM’ + <TABLE_LIST>
WHERE_CLAUSE : ‘WHERE’ + VALUE1 OP VALUE2
VALUE1: VALUE / COLUMN_NAME
VALUE2: VALUE / COLUMN_NAME
OP: +, -, /, * =

In this way, errors are detected in the syntax analysis phase and then proper steps are taken to correct those errors accordingly.


Related Solutions

The application of lexical analysis techniques in information retrieval system You should cover: 1) What is...
The application of lexical analysis techniques in information retrieval system You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
The application of lexical analysis techniques in text editor You should cover: 1) What is the...
The application of lexical analysis techniques in text editor You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
The application of lexical analysis techniques in spam email detection You should cover: 1) What is...
The application of lexical analysis techniques in spam email detection You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
Create the actual database using SQL syntax. This is completed using a Database Application (i.e Microsoft...
Create the actual database using SQL syntax. This is completed using a Database Application (i.e Microsoft Access, Oracle, or MySQL) as indicated by your professor. After creating the database – populate it with some data (could be made up). SQL syntax and the DB application will be discussed and taught in class. This is the final deliverable of the group project. Assignment is due by the due date as indicated by your professor. *Make sure to submit the completed database...
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from...
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. It is usually on of the more interesting topics we can discuss. Take the following scenario and map out the chain of custody (in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or...
Assignment Description: You will be required to conduct analysis of a technology/system application and write a...
Assignment Description: You will be required to conduct analysis of a technology/system application and write a formal paper. The analysis need to be of an application technology used in either (a) a clinical setting for managing health data, patient care, etc or (b) educational setting for improvement of teaching and learning of students, patients, etc. The Technology Application Analysis will be an independent activity for each student to be completed using resources available in your agency, IT department, on the...
List specific jobs that should be segregated in the purchases processing system.
List specific jobs that should be segregated in the purchases processing system.
Why should the valve cover and heads surface be cleaned before you install the engine cover
Why should the valve cover and heads surface be cleaned before you install the engine cover
You should try this code in Microsoft SQL Server to get the practice of using the...
You should try this code in Microsoft SQL Server to get the practice of using the command line and getting syntax errors. You can submit to me your sql files or just copy and paste of your code in a word document. I may try to run it, so make sure it is error free. Or you can show screen shots of code running. Write SQL CREATE Table statement to create the following table with  Owner ID  as a surrogate key.  Owner ID...
You should try this code in Microsoft SQL Server to get the practice of using the...
You should try this code in Microsoft SQL Server to get the practice of using the command line and getting syntax errors. You can submit to me your sql files or just copy and paste of your code in a word document. I may try to run it, so make sure it is error free. Or you can show screen shots of code running. Write SQL CREATE Table statement to create the following table with  Owner ID  as a surrogate key.  Owner ID...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT