1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
6

Ask the user to input a word. Then, print the first letter, the last letter, and the length of the word on the same line with no

spaces between them
Example:
Enter a word: apple
ae5

In edhesive please
Computers and Technology
1 answer:
igomit [66]3 years ago
3 0

Answer:

Scanner scan = new Scanner(System.in);

System.println("Enter a word: ");

String word = scan.nextLine();

System.out.println(word.substring(0,1) + word.substring(word.length()-1) + word.length());;

Explanation:

I'm going to assume that this is JavaScript.

You might be interested in
Which is the best method of marketing a game to casual players?
Phoenix [80]
A casual game is a video game targeted at or used by casual gamers. Casual games may exhibit any type of gameplay or genre. They are typically distinguished by simple rules and by reduced demands on time and learned skill, in contrast to more complex hardcore games. They typically impose low production and distribution costs on the producer. Casual games are often played on a personal computer online in web browsers, but are also popular on game consoles and mobile phones.

Hope this helped. Have a great day! :D
3 0
3 years ago
Read 2 more answers
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ____ key.
AVprozaik [17]
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ESC key. ESC stands for <span>Escape.
</span>The escape key is found <span>on most computer keyboards.  When the ESC key is presses t</span>hen the escape command is sent from the keyboard to a computer and this command o is interpreted by software as "stop". So, it is used to stop some actions.
5 0
3 years ago
A new folder can be created by
user100 [1]

Answer:

The fastest way to create a new folder in Windows is with the CTRL+Shift+N shortcut. 1. Navigate to the location where you want to create the folder. You can create a new folder at any location on your hard drive or within another folder (creating a subfolder) in File Explorer.[/tex]

5 0
3 years ago
Read 2 more answers
What are the implications for a company that relies solely on technology to store all of their data ?
romanna [79]

A store that relies solely on technology to store all of their data would be a store that either sells technology or an online store like Amazon

3 0
3 years ago
Other questions:
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    5·1 answer
  • When you save a drawing using paint, it's automatically stored as a?
    15·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Software applications called _____ provide the means to record information that passes through a computer or router that is hand
    10·1 answer
  • How are logical operators used?
    14·1 answer
  • A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a tec
    13·1 answer
  • What technology did one of the student's have to learn to use in order to help him with his homework in the film, "Disconnected:
    11·2 answers
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • Which program will have the output shown below?
    11·2 answers
  • question 5 you need to find the internet protocol (ip) address for a website. which command do you use on a windows system?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!