Which routine is configured to be called by another routine?
A. Fault
B. Start
C. Subroutine
D. Main

Answers

Answer 1
A routine called by another routine may be called a subroutine.
Answer 2

The routine that is configured to be called by another routine is Subroutine. Therefore option C is the correct resposne.

What is a Subroutine?

When a computer program doesn't return a value, a function or subroutine is a group of program instructions that work together to complete a single task. Then, whenever that specific task has to be carried out, this unit may be used in programs.

Programs may define functions internally or externally in libraries that are accessible to many different programs. A function may be referred to as a routine, subprogram, subroutine, method, or procedure in various programming languages. Technically, each of these phrases has a unique definition, and each language has its own nomenclature. Sometimes, the all-encompassing phrase "callable unit" is used.

While working on the ENIAC, John Mauchly developed the idea for a function for the first time. In January 1947, at a Harvard symposium on "Preparation of Problems for EDVAC-type Machines," he wrote about this idea. Commonly credited with formalizing this concept are Maurice Wilkes, David Wheeler, and Stanley Gill. In a contrast to an open subroutine or macro, they referred to it as a closed sub-routine.

To read more about Subroutine, refer to -  https://brainly.com/question/15870277

#SPJ2


Related Questions

On the home ribbon, what do you use to change the font size of characters in a cell

Answers

The font tab in the home ribbon

When operating a computer, a user interacts with
the operating system.
a software license.
the BIOS.
application software

Answers

When operating a computer, a user interacts with application software. Thus, option D is correct.

What is the application software?

An application is a computer software package that performs a specified job directly for an end user or, in certain situations, for another application. It is also known as an application program or application software.

An application can be a single program or a collection of applications. A computer programme that responds to user input and assists users in performing personal, professional, and educational tasks is known as application software.

This programme is frequently useful since it enables you to undertake tasks that express creativity, increase productivity, and improve communication. Application software's main function is to assist the user in doing certain activities.

Therefore, option D is correct.

Learn more about the application software, refer to:

https://brainly.com/question/29353277

#SPJ2

In your presentation you added a text box to?

Answers

The correct answer would be to - Cite a source

Someone who buys a song online and copies it for friends is violating
A)privacy rights.
B)ethical rights.
C)appropriate Internet use.
D)intellectual property rights.

Answers

Answer:

I know

I gave him a 5 star by mistake

The answer is actual D

Explanation:

Music is can be property

Because it can be owned

Two students are discussing how programmable thermostats work. Student A says that a piece of material within the thermostat changes length depending on moisture content of the air and that temperature is related to this change in moisture. Student B says that there's a material within the thermostat that changes its length based on temperature and that the measured temperature is related to the change in length. Which of the following statements is correct?

Answers

Student B is correct.

Is a list of variable information such as a name and address that is included in a document?

Answers

the Answer is a Data Source

Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?

Answers

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

are the ways data represented and transmitted with computers law of nature or law of man?

Answers

The way in which data are transmitted and represented with computers is done through the law of man because it is the man who determines through his technological knowledge the rules that must be established for the introduction and transmission of computational data. The data are represented by the use of codes under norms and lines according to a system of which it is studied and designed with a target.

The java compiler is able to find all programmer errors.

Answers

No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.

What is the difference between the RAM and ROM

Answers

ROM is data that is written to the hard drive and is not erased when the comupter is shut off

RAM is temporary data that is erased when the the computer is shut off

With network management software, a network manager can ____.

Answers

Manage all network resources such as users, computers, printers, rights etc.

__ is/are the amount of blank space between lines of text in a paragraph

Answers

Indents? Double Space? one of those

Answer:

The correct answer is line spacing

Explanation:

Which device should be used for enabling a host to communicate with another host on a different network?

Answers

A router should be used for enabling a host to communicate with another host on a different network.

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Answers

Virus                     

An array of strings , names , has been declared and initialized . write the statements needed to determine whether any of the the array elements are null or refer to the empty string . set the variable hasempty to true if any elements are null or empty-- otherwise set it to false .

Answers

#Python

hasempty = False
for name in names:
   if ( not name ):
      hasempty = True
      break  # speed things up

Leah deals with several file conversions every day.

Answers

That’s not a question but good for her

Which option helps you choose the design of a slide in a presentation?

A.Slide Layout
B.Shapes
C.Animation
D.Slide Transition

Answers

Hello! The slide transition helps with the transitions of slides and the animation helps out with the words appearing on the screen in a more creative way. Therefore, C and D are out. The slide layout is the part where if you click on it, slide designs are shown for you to choose from. The shapes can be used for design, but it doesn't help if you're looking for the design of a slide. The answer is A: slide layout.

Which website can help you find antivirus software?

Answers

McAfee!!! you should get it

The awser is b. i took the testo

Which component of a computing device drains the battery the fastest?

Answers

The LCD panel of the computing device drains the battery the fastest.This component  drains approximately 43% of the total battery life. Since the display is the biggest power drain in order to maximize the battery life of your computing device you should enable Power saver mode and make sure it's set to turn off the display quickly after inactivity. 

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the userâs knowledge or permission.

Answers

virus










-----------------------------------

Which of these can be considered data?

A.facts


B.information


C.belief


D.all of these

Answers

B.Information
can be considered data

Answer:

B) Information

Explanation:

Information is data

With a(n) ____ the editor, compiler, and executer are combined in the same application.

Answers

IDE, Integrated Development Environment

The standard character code that represents characters from multiple languages using 16 bits is called _____.

Answers

The answer is character encoding.  It is used in a way to represent charaters and in which can be used in different or even in languages that are multipled. This type of character standard uses sixteen bits in order for it to function.

Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be connected to the network. This circuit board is the _____.

fiber optic
network interface card
network operating system
peripheral

Answers

If it's an ethernet network:  network interface card

Which of the following is not an operating system?



A.Linux


B.Leopard


C.Microsoft Windows


D.Internet Explorer

Answers

D. Internet Explorer is a web browser application.

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a ______________________ which will ____________ the Astroliner off the ground and into the air to about 20,000 feet.

Answers

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a 747 aircraft. Which will tow the Astroliner off the ground and into the air to about 20,000 feet. 60 years ago,first demonstration of the basic concept of towing an un-powered aircraft behind a powered aircraft and then releasing it for autonomous flight. It was first accomplished with the German ME321 transport glider. 

The number of distinct values that can be represented using 5 bits is

Answers

2 to the power of 5, ie., 2^5 = 2*2*2*2*2 = 32.

Which commas is used to combine two or more cells together into one cell

Answers

The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)

A cyberbully is someone who invades another person’s privacy by

Answers

Insulting or harassing them over the Internet
intimidating someone online with threats.

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

Answers

do you need help , i think the answer is right in tha tsentence
Other Questions
What is the difference between it and is?a. information technology (it) pertains to the hardware and software components. an information system (is) is an assembly of data, procedures, and people that produces information.b. information technology (it) is an assembly of hardware, software, data, procedures, and people that produces information. an information system (is) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.c. information technology (it) pertains to the hardware, software, and data components. an information system (is) is an assembly of data, procedures, and people that produces information.d. information technology (it) refers to the products, methods, inventions, and standards that are used for the purpose of producing information. it pertains to the hardware, software, and data components. an information system (is) is an assembly of hardware, software, data, procedures, and people that produces information.e. information technology (it) pertains to the hardware and software components. an information system (is) is an assembly of hardware, software, data, procedures, and people that produces information? Using the Pythagorean theorem, find the length of a leg of a right triangle if the other leg is 8 feet long and the hypotenuse is 10 feet long. If KL = 2x, LM = 5x, and KM = 7, what is LM? Which number is the smallest? 4.4 105, 3.99 106, 2.6 102, 1.85 103 what is the difference between a atomic bomb and a nuclear reactor the probability of picking a red marble from a bag of 30 marbles is 1/5. how many blue marbles must be removed from the bag to increase the probability to 1/4 Which European power established the encomienda system in the Americas? 5._4 - (_.8_) = -3.61fill in the blanks please !! How long does it take for dachshunds to be full grown? Who wrote the sinad o'connor hit "nothing compares 2 u"? what happens if a spelling checker doesn't have a suggestion for a misspelled word? Which of the following can only be classified as a building block for the human body?A.fatsB.proteinsC.simple carbohydratesD.complex carbohydrates Continents float high because they are __________. There are two clusters of amazonian trumpeter species on the phylogenic tree because _________. see section 24.2 Why did W.E.B Du Bois oppose Booker T. Washington's views on racial discrimination? choose one of the following natural disasters . you may choose one that might occur in your community . then , using the three parts of an emergency preparedness plan , describe what your family would do during the natural disaster.flood tornado mudslide severe thunderstorm What was the Meiji government's position on education for all Japanese children A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted. True False How to divide 71525 using partial quotient if you want to say something that doesn't go with the main idea of your essay, you should Steam Workshop Downloader