Consider the following code segment containing a nested if-else statement:

```
if (x >= y) {
if (x*10 < 100) {
alert('ONE');
}
else {
alert('TWO');
}
}
else {
alert('THREE');
}
```
Given the following assignments, predict the behavior of the preceding code.


x=0; y=5; THREE

x=0; y=-5; ONE

x=9; y=9; ONE

x=22; y=21; TWO

Computer Science & Information Technology

You might also like to view...

When you click an anchor point with the Convert Anchor Point tool, ____.

A. a new direction line emerges B. large font size C. the direction handle is removed D. the anchor point is deleted

Computer Science & Information Technology

What is spoofing and how can it be used to attack a computer or network?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ Table query can create a new table based on data in an existing table

Fill in the blank(s) with correct word

Computer Science & Information Technology

In what type of trusted recovery process is the system able to recover without administrator intervention but the system may suffer some loss of data?

A. Automated recovery B. Manual recovery C. Automated recovery without undue data loss D. Function recovery

Computer Science & Information Technology