Flow Control Statements In Computer Essay

PAGES
1
WORDS
327
Cite

Flow Control Statements

In computer programming, the flow control statements and other constructs control the order in which loopingoperations are executed. For example, common statements such as for…next and while are known as flow control statements. Branching statements, such as if…then are also part of a programming language's flow control mechanism (Flow control).

Flow control statements alter the normal flow of program execution or the execution logic of a control construct. (Flow control statements).

The CONTINUE statement has no effect on program execution. It is generally used to mark a place for a statement label. The CYCLE statement interrupts execution of the current iteration of a DO loop. The EXIT statement terminates a DO loop. If it specifies the name of a DO loop within a nest of DO loops, the EXIT statement terminates all loops by which it is enclosed, up to and including the named DO loop.

The computed GO TO statement transfers control to one of several labeled statements, as determined by the value of an arithmetic expression. The unconditional GO TO statement transfers control to the statement with the specified label.

The arithmetic IF transfers control to one of three labeled statements, as determined by the value of an arithmetic expression. The logical IF statement executes a single statement, conditional upon the value of a logical expression. The statement it executes must not be a statement used to begin a construct, any END statement, or any IF statement.

The PAUSE statement causes a temporary break in program execution. The STOP statement terminates program execution.

The IF-THEN statement is the most basic of all the control flow statements. It tells your program to execute a certain section of code only if a particular test evaluates to TRUE.

Bibliography

"Flow control." n.d. Webopedia. 28 March 2009 .

"Flow control statements." n.d. Hewlett Packard. 28 March 2009 .

Cite this Document:

"Flow Control Statements In Computer" (2009, March 28) Retrieved May 5, 2024, from
https://www.paperdue.com/essay/flow-control-statements-in-computer-23523

"Flow Control Statements In Computer" 28 March 2009. Web.5 May. 2024. <
https://www.paperdue.com/essay/flow-control-statements-in-computer-23523>

"Flow Control Statements In Computer", 28 March 2009, Accessed.5 May. 2024,
https://www.paperdue.com/essay/flow-control-statements-in-computer-23523

Related Documents

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

...Good patient care is illustrated by being caring and thoughtful. It is important to also use a correct nursing care plan, and safe nursing techniques. This includes not only infection control, hand-washing and correct skills, but up-to-date procedures and knowledge. A a) Quote part of the above statement in a sentence. Effective nurses are both "caring and thoughtful" in their approach with patients. A b) Paraphrase the above statement in a sentence. Effective nurses

Computer assisted learning (CAL), once a novel concept, is a staple in numerous classrooms across the country, from the primary education to the university level. Computer assisted learning offers both students and teachers a daunting and near-limitless education supplement. However, this paper will examine examples where computer assisted learning is more or less effective and why. It will be revealed that computer assisted learning programs that are most effective are

Likewise, a similar study by Desai et al. (2000) that compared traditional lecture format training with CBT found that, "The CBT subjects' overall end-of-training and one-month-after-training performance was significantly better than [the traditional lecture method] subjects' performance" (p. 239). By sharp contrast, the analysis of the effectiveness of CBT by Bowman et al. (2009) found that the effectiveness of this alternative can be adversely affected by a number of Navy-specific

Software Requirements Engineering Computer software technology has improved significantly over the past decade leading to more efficient and comprehensive information systems. With the innumerable computing systems there is also a corresponding increase in the complexity of these systems. Today software requirements analysis has become an indispensable part of software development. Over the years there has been a continued stress on the importance of a properly planned project evaluation, requirement specification and