1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
10

Given a string, an integer position, and an integer length, all on separate lines, output the substring from that position of th

at length.
Ex: If the input is:


Fuzzy bear


3


4


the output is:


zy b


Note: Using a pre-defined string function, the solution can be just one line of code. It does not have to be one line though it can be a lot.


Code:


#include

#include

using namespace std;


int main() {

string workStr;

int indexBegin;

int len;


getline(cin, workStr);

cin >> indexBegin;

cin >> len;


/* Your code goes here */


return 0;

}
Computers and Technology
1 answer:
lana [24]3 years ago
4 0

quetma es elpx mjeghgieo

You might be interested in
In a linux script, the line ____ is important because it identifies the file as a script.
igor_vitrenko [27]
The closest line to that would be the first line:


#!/bin/bash

echo "Hello World!"


BTW, the "#!" is referred to as a she-bang. When those are the first characters executed, the (requires an absolute path) program that follows is launched, and the rest of this file is given to it as data. To run this like a program, the execute permissions need to be set ( chmod 0755 script.sh ).
8 0
3 years ago
What is a way to Procter your social security number and other sensitive information from identity theft
Morgarella [4.7K]
Hey mate 

by being smart about it and not telling anybody and if u find it no the inter net  call the police  
5 0
3 years ago
What is true concerning physical and logical topologies? Physical topologies are concerned with how a network transfers frames.
Sindrei [870]

Answer:

Physical means the actual wires.  Physical is concerned with how the wires are connected. Logical is concerned with how they transmit.

Explanation:

8 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
IF ANYONE USES THE COMPUTER PROGRAM SCRATCH I NEED YOUR HELP!! 15 POINTS!!
Irina-Kira [14]
The mouse down block C, 2) is c, and
4 0
4 years ago
Read 2 more answers
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    14·2 answers
  • What is an online alternative to customers sending checks via mail?
    7·1 answer
  • Briefly describe the significance of the shannon limit for information capacity.
    5·1 answer
  • Find Multiplication of Binary Numbers: 1100112 x 10012
    9·1 answer
  • Interpretation is adding meaning to information by making connections and comparisons and by exploring causes and consequences.
    11·1 answer
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Select the correct answer. Tom recently visited a science exhibition where he learned that computer experts programmed robots to
    6·2 answers
  • Which of the following files should be multiplexed, for safety? (Choose all correct answers.)
    6·1 answer
  • What do you use the Pygame library for?
    6·1 answer
  • State two differences between a mouse pointer and a mouse cursor​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!