1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
14

Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis

ting of the first three characters of the value of word. So if the value of word were "dystopia" the expression's value would be "dys".
Computers and Technology
1 answer:
Helga [31]3 years ago
6 0

Answer:

Explanation:

The language I use would do it as

h1$ = copy(h$,1,3)

This may not satisfy you, because your language could be quite different. You might want an input statement of some kind that would define h$. This assumes that somewhere h,h1 are declared as  strings.

You also have to know how to read an input. My language uses readln(input,h)

and how to write it on the screen write(h1) or writeln(h1)

You might be interested in
The most popular way for hackers to take over hosts today is ________.
asambeis [7]

 The most popular way for hackers to take over hosts today is by taking over an application.

 This is the reason why application security in corporate computer security systems is a very important aspect.

A hacker can log into the machine, download an executable, ran it, cover his/her tracks by deleting the installer, and log off.


8 0
3 years ago
Read 2 more answers
A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
Harman [31]
False. A trojan horse is a type of malware that misleads as to what it does.
Example: “Click here to download Sims for free!”
You click it, and next thing you know instead of getting Sims for free you have a virus.
5 0
4 years ago
What tips or techniques should you keep in mind when shooting photographs on a rainy day?
SashulF [63]
Simple: Keep your camera protected from the rain

Here are some tips for photographing during rainy day: 1) Use image stabilization or tripod.
2) Choose a larger aperture.
3) Change the object on which you focus.
4) Have a well-defined center of interest.
5) Review all images.
6) Use exposure compensation.

7 0
3 years ago
According to the Doppler effect, objects moving away from Earth would have a
Stells [14]
<span>According to the Doppler effect, objects moving away from Earth would have a redshift.  </span>A <span> redshift means that every wavelength becomes longer and if we observe Hydrogen lines that are at a certain position, those will become redshifted.</span>
7 0
3 years ago
Read 2 more answers
List of steps to apply bold and italic formatting to a word​
ch4aika [34]
To make text bold, select and highlight the text first. Then hold down Ctrl (the control key) on the keyboard and press B on the keyboard. To make text italic, select and highlight the text first. Then hold down Ctrl (the control key) on the keyboard and then press the I on the keyboard
5 0
4 years ago
Read 2 more answers
Other questions:
  • Jorge has $300 for work he performed. He expects to spend the money in the next few weeks to buy a new bike. Which type of accou
    8·1 answer
  • Using the _____ model brings sellers and buyers together on the web and collects commissions on transactions between these parti
    5·1 answer
  • It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an
    6·2 answers
  • Zach would like to reuse a spreadsheet that he created last year. However, he will need to delete the contents of several cells.
    5·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could b
    10·2 answers
  • What is the code for this please?​
    13·1 answer
  • You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
    11·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to sca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!