1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
6

Which statement best describes the cut and paste option in a word processor?

Computers and Technology
2 answers:
tekilochka [14]3 years ago
8 0

B i correct so yea and yea

slamgirl [31]3 years ago
5 0

C. They can make a sentence you accidentally deleted reappear in the document.

Cut = Delete

Paste = Paste back anything into said document if you have it copied to the clipboard

You might be interested in
1- How should an operating system support communication between applications? explain your reasoning?
Luba_88 [7]

<u>Explanation:</u>

An operating system support communication between applications through regions of memory shared between the applications. For example, a computer's RAM (random access memory) allows each running application to use a portion of the computer's memory.

7 0
3 years ago
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
Liula [17]
He should launch an M-commerce app
5 0
2 years ago
Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
Afina-wow [57]

Answer:

The correct answer to the following question will be Option B.

Explanation:

<u>Open System interconnection:</u>

  • A practical and conceptual layout that describes network communication that will be used by the systems that are accessible to interconnection as well as other systems, is called the OSI model. This may also be referred to as the OSI model with seven layers.
  • The OSI model aims to direct developers and creators so that they would modularize with the wireless communication devices and computer programs they build, and to promote a consistent structure that defines the features of a network or telecom system.

Therefore, Option B is the right answer.

8 0
3 years ago
The incident results in huge losses of revenue as a result their mobile app service is withdrawn. Investigators discovered a vul
zlopas [31]

Answer:

The attackers used the code injection

Explanation:

<em>Because, the HMTL5 allows data and code to be mixed together, making code injection attacks possible. </em>

6 0
3 years ago
What term identifies the physical interface between a computer and its peripherals?
antoniya [11.8K]
(B. Hardware), Hardware is physical components, Software are the programs in the computer.
3 0
3 years ago
Other questions:
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • The rmdir command (with no options) can only remove empty directories <br> a. True <br> b. False
    14·1 answer
  • Explain why the game of economics has no winner
    8·1 answer
  • How do i unblock website on my school computer
    7·2 answers
  • What is the difference, if any, between an alpha test group and a beta test group? An alpha test group is made up of people asso
    9·1 answer
  • What is the output after running the following code snippet? int number = 600; if (number &lt; 200) { System.out.println("Low sp
    15·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
    5·1 answer
  • Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns hel
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!