subroutine

(redirected from Executable code)
Also found in: Thesaurus, Medical, Legal, Financial.

sub·rou·tine

 (sŭb′ro͞o-tēn′)
n. Computers
A set of instructions that performs a specific task for a main routine, requiring direction back to the proper place in the main routine on completion of the task.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

subroutine

(ˈsʌbruːˌtiːn)
n
(Computer Science) a section of a computer program that is stored only once but can be used when required at several different points in the program, thus saving space. Also called: procedure
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014

sub•rou•tine

(ˈsʌb ruˌtin)

n.
an instruction sequence that a programmer can insert into a computer program as needed.
[1945–50]
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.subroutine - a set sequence of steps, part of larger computer programsubroutine - a set sequence of steps, part of larger computer program
software, software package, software program, software system, computer software, package - (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory; "the market for software is expected to expand"
computer program, computer programme, programme, program - (computer science) a sequence of instructions that a computer can interpret and execute; "the program required several hundred lines of code"
cataloged procedure - a set of control statements that have been placed in a library and can be retrieved by name
contingency procedure - an alternative to the normal procedure; triggered if an unusual but anticipated situation arises
library routine - a debugged routine that is maintained in a program library
random number generator - a routine designed to yield a random number
recursive routine - a routine that can call itself
reusable routine - a routine that can be loaded once and executed repeatedly
executive routine, supervisory routine - a routine that coordinates the operation of subroutines
tracing routine - a routine that provides a chronological record of the execution of a computer program
service routine, utility routine - a routine that can be used as needed
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
Translations

subroutine

[ˌsʌbruːˈtiːn] Nsubrutina f
Collins Spanish Dictionary - Complete and Unabridged 8th Edition 2005 © William Collins Sons & Co. Ltd. 1971, 1988 © HarperCollins Publishers 1992, 1993, 1996, 1997, 2000, 2003, 2005

subroutine

[ˈsʌbruːtiːn] nsous-programme m
Collins English/French Electronic Resource. © HarperCollins Publishers 2005

subroutine

[ˈsʌbruːˌtiːn] n (Comput) → sottoprogramma m
Collins Italian Dictionary 1st Edition © HarperCollins Publishers 1995
References in periodicals archive ?
APT detection comparison for international testing laboratories APT Attacks TTA KISA Tolly ICSA Veritest NSS E-mail APT X O X O X O DBD APT X X X O X O Messenger APT X X X O X O Zeroday X O X X X [DELTA] Executable code X O X O O O Non-executable code X X X X O O Customized code X X X X X X Table 2.
What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data files, customer reports of false positives, Microsoft Office suite, ActiveX controls and a bit of serendipity?
In order to defeat data recovery efforts, ransomware coders have developed attack-loops which stealthily insert malicious executable code within an organization's file system.
Kierski, M.Okoniewski and P.Gawrysiak, "Automatic Classification of Executable Code for Computer Virus Detection", in Conference: Intelligent Information Processing and Web Mining, Proceedings of the International IIS: IIPWM'03, Zakopane, Poland, 2003, pp.
Additional security features include USB/CD/DVD access control and centralised firewall management along with Default Deny mode that blocks attempts to run any unauthorised executable code or drivers on ATMs and POS terminals.
The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader.
Return oriented programming (ROP) attacks are a superior form of buffer overflow assaults [2] that reuse existing executable code towards malevolent purpose.