1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
2 years ago
10

Given a string, an integer position, and an integer length, all on separate lines, output the substring from that position of th

at length.
Ex: If the input is:


Fuzzy bear


3


4


the output is:


zy b


Note: Using a pre-defined string function, the solution can be just one line of code. It does not have to be one line though it can be a lot.


Code:


#include

#include

using namespace std;


int main() {

string workStr;

int indexBegin;

int len;


getline(cin, workStr);

cin >> indexBegin;

cin >> len;


/* Your code goes here */


return 0;

}
Computers and Technology
1 answer:
lana [24]2 years ago
4 0

quetma es elpx mjeghgieo

You might be interested in
Name two ways you can identify the pid number of the login shell.
Katyanochek1 [597]
Two approaches are:
Echo $$
Ps
3 0
3 years ago
Which is not a MARKETING impact of technology?
Artist 52 [7]

Answer:

the answer is environmental

6 0
3 years ago
An Oven Is Just A Spicy Refrigerator? Yes Or No??
Marianna [84]

Answer:

No

Explanation:They both have different actions

3 0
2 years ago
Read 2 more answers
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
2 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
2 years ago
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
    5·2 answers
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • How many water bottles must be collected to win?
    8·2 answers
  • _____ are likely to support bigger government, social welfare programs, and legalized abortion.
    8·2 answers
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • For this assignment, you will write a program that calculates gross and net revenue for a movie theater. Consider the following
    15·1 answer
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!