1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
8

In procedural programming, where does the flow of control usually route from the main function?

Computers and Technology
1 answer:
Zinaida [17]3 years ago
6 0

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

You might be interested in
DO NOT ANSWER FOR JUST POINTS
Elza [17]

Answer:

E.

a medium dashed line

Explanation:

I always use medium hehe so I think that'll work.

5 0
2 years ago
Read 2 more answers
Is the app scener safe? its a chrome webstore app on computer.​
Sophie [7]

Answer:

Maybe

Explanation:

If you are unsure if a website is safe look for signs. If its asking you to allow advertisement then no. I suggest you download a VPN before going to the website just to be safe

5 0
3 years ago
Gaming related
Blababa [14]

Answer:

yes affects your K/D

Explanation:

winner winner chicken dinner

please mark me please brainliest or mark thanks

5 0
2 years ago
The main technology for setting up a wireless local area network is​
julsineya [31]

Answer:

llllllffl

Explanation:

nnñbh hi Luigi

6 0
3 years ago
Jennifer has written a short story for children. What should be her last step before she submits the story for publication? A) p
erik [133]
It would be a or c when she is writing a childerns story
5 0
3 years ago
Read 2 more answers
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • What does Intel mean in this phrase(collect all intel).
    9·2 answers
  • PLEASE HELP!
    13·2 answers
  • How will you apply what you have learned in our topic today in a real life situation? Show your answers in the acronyms provided
    6·1 answer
  • Which statement describes one drive?
    6·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • What is the Role of an algorithm?
    11·1 answer
  • Question 3
    13·1 answer
  • 4. In paragraph 7, what is the meaning of the phrase "not
    13·1 answer
  • What is an issue with using cloud computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!