1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
11

Assume that print_error_description is a function that expects one int parameter and returns no value. Write a statement that in

vokes the function print_error_description, passing it the value 14.
Computers and Technology
1 answer:
murzikaleks [220]3 years ago
5 0

Answer:

The program to this question can be given as:

Program:

#include<stdio.h> //include header file.

void print_error_description(int x)  //function definition

{ //body of the function

printf("The value of the parameter is = %d",x); //print value.

}

int main()  //main method

{

print_error_description(14);  //calling a function

return 0;  

}

Output:

The value of the parameter is = 14

Explanation:

According to the question we define a function that is "print_error_description()". In this function we pass an integer element that is x. In this function we use void as a return type because this return type does not return any value. In the main method we call the function and pass the value that is 14.

You might be interested in
A laptop computer is smaller than desktop computer. True or false
alina1380 [7]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
_______ is a process that insures that operations meet data validity standards. For instance, information systems that process c
lutik1710 [3]

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

5 0
3 years ago
Consider Ron’s budget. How much money does Ron have left over each month?
vladimir1956 [14]
What is Ron’s budget?
4 0
3 years ago
Read 2 more answers
Question: define oprators​
Svetlanka [38]

Answer:

Explanation:

Operator can be defined as

a character or characters which gives determination of actions that are needed to be performed/ considered. Operators are symbols that gives the compiler information to perform specific mathematical/logical manipulations.They are special type of functions, which are capable of taking one or more arguments, then produces a new value. Different types of operator are;

✓arithmetic operators(addition "+" substraction "-"

✓relational operators( greater than ">"

lesser than"<"

✓Logical operators.( Connective words/symbols such as AND, NOT, OR)

Arithmetic Operators: These include "+" (addition), "-" (subtraction), "*" (multiplication), "/" (division), "\" (integer

5 0
3 years ago
IOS 0R ANDR0ID ???
Lera25 [3.4K]

Answer:

Both are awesome!

Explanation:

One thing we shouldn't do is downgrade others for having an android or calling someone basic because they have ios. Both have their pros and cons, but idk because I don't have a phone! Hehe. But my family primarily uses IOS.

3 0
3 years ago
Other questions:
  • How to copy and paste using keyboard onchromebook?
    11·1 answer
  • The ____ file permission category in unix/linux systems typically entails all permissions and is designated by the letter u.
    7·1 answer
  • I microwaved my phone and this Bluetooth popup won't go away and I can't connect to Bluetooth. Help. I have a Google pixel 3XL I
    6·1 answer
  • A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d
    11·1 answer
  • Write a MIPS assembly language program that accomplishes the following tasks:The program will prompt the user to enter an intege
    7·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • Of the following online activities, identify the TWO that are most likely to be affected by bandwidth quality
    11·1 answer
  • What is Cloud computing? Explain briefly
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!