Conditional statement, Basic Computer Science

Conditional statement:

An If statement is composed of three parts. The first part should be keyword w.r.t language to convey to the computer that it is if statement. And a Boolean expression. The second and thirds part can be a statement or group of statements as defined in rules of grammar of language.    Generally, an if statement is evaluated and executed in the following sequence: first it evaluates the boolean expression. If the expression is true, the statements in the second part are executed.

Otherwise if it is  false, the statements in the third part are executed.  The third part is optional; if it is absent and the expression is false, then the program control simply moves on to the next statement in the sequence.  

Posted Date: 10/23/2012 3:56:53 AM | Location : United States







Related Discussions:- Conditional statement, Assignment Help, Ask Question on Conditional statement, Get Answer, Expert's Help, Conditional statement Discussions

Write discussion on Conditional statement
Your posts are moderated
Related Questions
File Organization There are three types of file organization used in practice. Let us consider the example of a dictionary. The dictionary contains listing of English wo

design railway maintenance system. draw er diagram.


The TCP/IP networking protocol suite is so basically named for two of its very most and important protocols: Transmission Control Protocol online tutoring Indication Manage


Subroutine :   A subroutine  is a type of subprogram, a piece of code within a larger program that performs a specific task and is relatively independent of the remaining code.

how do you let kids learn on it

Design an ER diagram for an IT training group. The company has 12 instructors and can handle upto 100 trainees for each training section. The company offers 5 advanced technology c

types of computer on the basis of shape, size & resources

Question 1 List two I/O virtualization methods. Based on different features compare these two methods Question 2 Discuss three areas considered by organizations to secure the