programming

Logical Operators

“Programs must be written for people to read, and only incidentally for machines to execute.”

Harold Abelson, Structure and Interpretation of Computer Programs

Logical operators are generally symbols or words which connect two or more expressions that allow a program to make a decision based on a given set of conditions.

Logical operators usually control the program flow and are frequently used with the if, while, or some other control statement.

Three (3) Types Logical Operators

  1. Logical AND operator (&&): For logical AND operators, both conditions must be true for the statement to be true. If one of them is false, then the program will return false.
//Example
let a, b;
a = 3; b = 4;
console.log(a === 3 && b === 4) //TRUE
console.log(a === 3 && b === 3) //FALSE

2. Logical OR operator ( || ): For logical OR operators, one of the operands just have to be true for the statement to be true.

//Using variables from our first example
console.log(a === 3) || (b === 4) //TRUE
console.log(a === 3) || (b === 3) //TRUE

3. Logical NOT operator ( ! ): This is used to reverse the logical state of its operands. If a condition is true, then the Logical Not will make it false.

//Using variables from our previous example
console.log(!(a === 3)) //FALSE
LANGUAGEANDOR NOT
C++&&||!
C#&&||!
Java&&||!
JavaScript&&||!
PHP&&||!
Pythonandornot
Swift&&||!

Author

Recent Posts

Apple is developing a doorbell camera equipped with Face ID technology.

Apple is reportedly developing a new smart doorbell camera with Face ID technology to unlock…

9 hours ago

Google Launches Its Own ‘Reasoning’ AI Model to Compete with OpenAI

This month has been packed for Google as it ramps up efforts to outshine OpenAI…

3 days ago

You can now use your phone line to call ChatGPT when cellular data is unavailable.

OpenAI has been rolling out a series of exciting updates and features for ChatGPT, and…

4 days ago

Phishers use fake Google Calendar invites to target victims

A financially motivated phishing campaign has targeted around 300 organizations, with over 4,000 spoofed emails…

5 days ago

Hackers Exploiting Microsoft Teams to Remotely Access Users’ Systems

Hackers are exploiting Microsoft Teams to deceive users into installing remote access tools, granting attackers…

6 days ago

Ethical Hacking Essentials

Data plays an essential role in our lives.  We each consume and produce huge amounts…

1 week ago