1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
2 years ago
6

Where does a word processor store items that you cut or copy?

Computers and Technology
1 answer:
V125BC [204]2 years ago
3 0
<span>it is stored on your clipboard and you can get to it by pressing ctrl+c</span>
You might be interested in
What attracts attention and adds spatial depth to a two-dimensional design.
Harlamova29_29 [7]

Answer:

Hi,

<u>Visual weight</u> attracts attention and adds spatial depth to a two-dimension design.

Explanation:

Visual weight is a measure of the force a piece of art exerts on a viewer/ observer.When a piece of art attracts the eye more, we say the visual weight of that element is higher.Visual weight is measured by observing some features like size, color, position, orientation, shape and texture.

A large art piece will have more visual weight than a small art piece.Warm color such as red has more visual weight more than cool color such as yellow because warm colors tend to occupy the foreground in art pieces.Elements in an art piece that occupy the foreground have more visual weight than those occupying the background.Diminishing the size of an object on the art piece can help you attain spatial depth.

Best of Luck.

6 0
3 years ago
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
allsm [11]

Answer:

The code is below. The output is "Eric went to Chipotle to buy 12 different types of Cars"

Explanation:

import java.util.scanner;

public class labprogram {

    public static void main (string [ ] args) {

    scanner scnr = new scanner (system.in) ;

    string firstname;

    string genericlocation;

    int wholenumber;

    string pluralNoun;

   firstName = scnr.next();

   genericLocation = scnr.next();

   wholeNumner = scnr.nextInt();

   pluralNoun = scnr.nextLine();

   system.output.println(firstname + " went to " + genericlocation + " to buy " + wholenumber + " different types of " + pluralnoun + " . ");

}

 }

6 0
3 years ago
I’ll mark brainliest if correct
aliya0001 [1]

Answer:

I believe the answer is B

Explanation:

5 0
3 years ago
What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
Minchanka [31]
White hat hackers use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers. They can sometimes be paid employees or contractors working for companies as security specialists who attempt to find gaps in security.
6 0
2 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
2 years ago
Other questions:
  • Briefly define "address space" and discuss its major tradeoffs (advantages/costs). What problem is it addressing?
    10·1 answer
  • Careers in information technology deal with
    12·2 answers
  • Convert each of the following base 10 &amp; base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
    8·1 answer
  • Which of the following speeches is an example of a demonstration speech? a. “Who was Abraham Lincoln” b. “The Human Brain and it
    5·1 answer
  • To combine concepts or ideas into a whole is called
    11·2 answers
  • Help with this please anyone
    15·2 answers
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • Question #5
    11·2 answers
  • Write a SQL query to display films in inventory that have never been rented for all stores. Include inventory ID, film ID, film
    13·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!