1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
2 years ago
13

Difference between copy command and cut command

Computers and Technology
1 answer:
SOVA2 [1]2 years ago
8 0

Answer:

Control (Ctrl) + C. Remember "C" as. The COPY command is used for just that - it copies the text or image you have selected and stores is on your virtual clipboard

Cut command = Sections of a specified file or piped data and print the result to standard output. The command cuts parts of a line by field, delimiter, byte position, and character.

Explanation:

Think of copy command as a "duplicating tool." It is taking something and duplicating it, making an exact second version of it.

The cut command is like a "delete" key. It takes something and cuts it, or deletes it.

You might be interested in
What type of storage system is a hard drive on a computer?<br> Need HELP fast, please.
weqwewe [10]
A hard drive is disk storage device that uses magnetic storage.
7 0
3 years ago
Read 2 more answers
Walter is developing a website for the logistics service he offers. He wants to make the website attractive, bright, and visuall
vlada-n [284]

Walter develop the website by:

  • Registering for a domain name
  • Research for a web hosting firm.
  • Have and Prepare your content done.
  • Lastly, create or build your website.

<h3>Can a person develop my own website?</h3>

The use of CMS that is website building platform is known to be a type of platform that can also help one in building websites and handling or monitoring its online content.

Note that by following the above steps,  Walter can create or develop his own website.

Learn more about website from

brainly.com/question/13171394

#SPJ1

6 0
2 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
3 years ago
How do i delete cookies on a chromebook?
Sphinxa [80]

Answer:

Just go into the browser then go to the searchbar go to any website then click the lock icon in the searchbar then click cookies then go from there

Also you can look this simple info up on g0ogle

6 0
3 years ago
What is the dark, sticky substance that forms when tobacco is burned?
sashaice [31]

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

7 0
3 years ago
Other questions:
  • A ____ is any manipulation of data, usually with the goal of producing information.
    9·1 answer
  • which of the following information technology career fields generally requires the lowest level of education for an entry level
    9·1 answer
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • Select what's true about packet sniffers. Check All That Apply Legitimate sniffers are used for routine examination and problem
    15·1 answer
  • Joining strings together is known as?
    7·1 answer
  • In this lab, you will write a function called numberGuessingGame(). When the function is called, it will do the following: gener
    13·1 answer
  • When mehtod X calls method Y , method Y called methhod Z, and method Z calles method X, this is called
    9·1 answer
  • I need help with getting a profile pic
    5·1 answer
  • Join my me et.goo gle.etj-dovn-kds​
    11·1 answer
  • I NEED THIS DONE NOW ASAP, PLS HELP ME
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!