The do-while loop
| Main Authors: | Shah, Asadullah, Khowaza, Khamran |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21879/ http://irep.iium.edu.my/21879/1/9.pdf |
Similar Items
Do-While loops
by: Phatan, Agha Javed, et al.
Published: (2011)
by: Phatan, Agha Javed, et al.
Published: (2011)
The for loop
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Post-test and nested loops
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Review, summary & building skill
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Review of variables, formatting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Review of iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Functions
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
For loops
by: Phatan, Agha Javed, et al.
Published: (2011)
by: Phatan, Agha Javed, et al.
Published: (2011)
Effects of eye health among youngster while playing computer game
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
Loops in Java
by: Phatan, Agha Javed, et al.
Published: (2011)
by: Phatan, Agha Javed, et al.
Published: (2011)
Nested loops
by: Phatan, Agha Javed, et al.
Published: (2011)
by: Phatan, Agha Javed, et al.
Published: (2011)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2016)
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2016)
Loop pitfalls and exercise
by: Phatan, Agha Javed, et al.
Published: (2011)
by: Phatan, Agha Javed, et al.
Published: (2011)
An exploratory qualitative study to identify factors affecting requirements elicitation and fact finding while developing health care knowledge management systems in Pakistan
by: Arshad, Arfan, et al.
Published: (2017)
by: Arshad, Arfan, et al.
Published: (2017)
Control panel of an oscilloscope
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Measurement techniques
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Soldering iron practice
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Bitwise operators and type casting
by: Shaikh, Asadullah, et al.
Published: (2011)
by: Shaikh, Asadullah, et al.
Published: (2011)
The If-Else-If statements
by: Shaikh, Asadullah, et al.
Published: (2011)
by: Shaikh, Asadullah, et al.
Published: (2011)
"Do it yourself moves and changes" PBXoIP system
by: Abd. Rahman, Farah Adibah
Published: (2006)
by: Abd. Rahman, Farah Adibah
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Arithmetic expressions and data types in C++
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Decision making: If-else statements and relational operators
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Logical operators and switch statements
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Revisiting far/near infrared pyramid-based fusion types for night vision using matlab
by: Mehfooz, Osama, et al.
Published: (2011)
by: Mehfooz, Osama, et al.
Published: (2011)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Task scheduling
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Call-by-value and reference
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
More on functions
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Internet banking in Pakistan: finding complexities
by: Akhlaq, Mohammed ather, et al.
Published: (2011)
by: Akhlaq, Mohammed ather, et al.
Published: (2011)
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Voltage follower
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Inverting amplifier
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Summing amplifier
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Do-While loops
by: Phatan, Agha Javed, et al.
Published: (2011) -
The for loop
by: Shah, Asadullah, et al.
Published: (2011) -
Post-test and nested loops
by: Shah, Asadullah, et al.
Published: (2011) -
Iterative structures
by: Shah, Asadullah, et al.
Published: (2011) -
Review, summary & building skill
by: Shah, Asadullah, et al.
Published: (2011)