Skip to main content

Programing Langauges HLL vs LLL

High Level Languages:

    High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.

    High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language.

Advantages of HLL:

  • It provides higher level of abstraction from machine languages.
  • It is machine independent languages.
  • Less error prone, easy to find debug errors.
  • They provides the better programming productivity.

Disadvantages of HLL: 

  • Its take additional time to translate its code to machine code.
  • HLL programmer are much slower than the Low Level Language Programmer(LLL)
  • Compared to LLL they are less efficient in time & space complexity.
  • These languages can not communicate with the hardware

Low Level Languages:

Low Level Languages are very close to machine level instruction sets. A low level languages can directly interact with the registers & memory of a device. Since Instructions are written in low level languages so LLL are machine dependent and these are not portable.

 These languages are not requires any compilers or interpreter to convert their language, because they use an assembler to translate their code from LLL to machine level language.

As we all know computer understand only binary numbers so we can say it is the language of a computer and this assembler basically convert a LLL code to binary code to make understandable by a computer.

These languages are very efficient in space & time complexity. These are mostly used to develop the Operating Systems, device drivers, databases etc.

Advantages of LLL:

  • First advantage is we all know that its programs are too much memory & time efficient.
  • They do not need any compiler or interpreter so that's the way we got time complexity.
  • LLL provides direct maiupulations with registers & storage.
  • LLL can directly communicates with the hardware.

Disadvantages of LLL:

  • Its very difficult to develop, debug and maintain a LLL program.
  • LLL programs are more errors prone.
  • LLL usually results in poor programming productivity.
  • Programs developed using LLL are machine dependent & are not portable.

Conclusion:

 So conclusion is that if you are totally new in programming field i will suggest you to just go with HLL, because when you start learning with these languages you got a extra level motivation to go ahead & whenever you complete the HLL then if you really want to go more deep the go with them.
There is also a middle level language, we will talk on this after some time.............................

Thanks for reading this blog!!!!!!

Comments

Popular Posts

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...

A technical preview of an Operating System

Operating System (OS): An Operating system consists of a set of programs which controls, co-ordinates and supervises the activities of the various components of a computer system. Its function is to link between the computer hardware and the user. An operating system is a software or a series of programmes, which performs various types of functions in order to manage and organize file so". Objectives:  There are lot of objectives of an operating system, actually it covers the birth of a perfect operating system. A user is just like a wanting animal they just want everything. But as a developer we are just tying to make our software more & more better as per user requests. These are some main objectives ------ To describe the basic organization of computer systems. To provide a grand tour of the major components of operating systems. Provide more convenient environment for users. Provide maximum utilized performance to users as per hardware existance. Computer Startup: When a c...

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

Solution | Secure Workloads in Google Kubernetes Engine: Challenge Lab | 2022

  Task 0: Download the necessary files :   gsutil cp gs://spls/gsp335/gsp335.zip . unzip gsp335.zip Task - 1: Setup cluster gcloud container clusters create <cluster-name> \    --zone us-central1-c \    --machine-type n1-standard-4 \    --num-nodes 2 \    --enable-network-policy gcloud sql instances create <your-sql-instance-name> --region us-central1 Task - 2: Setup wordpress: Create database - wordpress Go to the SQL -> open the  created instance (wordpress-db-387) -> then database -> Create database  Database name :wordpress Create -> users-> add user Account User name: wordpress Add Add user - wordpress (no password) Service account gcloud iam service-accounts create <your-service-account- credentials> gcloud projects add-iam-policy-binding $DEVSHELL_PROJECT_ID \    --member="serviceAccount:< your-service-account- credentials>@$ DEVSHELL_ PROJECT_ID.i...

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios ...