1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
6

Which statement best describes the cut and paste option in a word processor?

Computers and Technology
2 answers:
tekilochka [14]3 years ago
8 0

B i correct so yea and yea

slamgirl [31]3 years ago
5 0

C. They can make a sentence you accidentally deleted reappear in the document.

Cut = Delete

Paste = Paste back anything into said document if you have it copied to the clipboard

You might be interested in
Question
Serhud [2]
Could be second or all of above
8 0
3 years ago
"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
Serggg [28]

Answer:

decision logic

Explanation:. The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works. These systems includes the following :

a) Order processing,

b)Pricing

c) Inventory control, and

d) Customer relationship management. And the traditional means of modifying the decision logic of information systems involves heavy interaction between business users and information technology (IT) analysts.

3 0
4 years ago
Why do you think it is important to consider ethical considerations when reviewing technology and assessing the impact of partic
IgorLugansk [536]

Answer:

The correct answer should be: "It is important to reaffirm and test technologies' importance and impact to society in order to reflect upon their benefits or damages to the environment".

Explanation:

Technologies have a major importance in society nowadays, although they also have a great impact in the environment, whether for good or not. The fact is that reviewing and assessing technologies' importance and impact are necessary to test and garantee if they have been developed in an environmental friendly manner or with no worries for natural resources and society. Therefore, any technology must be ethical in terms of improving society with no damages, or as least as possible, to the environment.

(ps: mark as brainliest, please?!)

7 0
3 years ago
VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
Tanya [424]

Answer:

ASIC

Explanation:

Undoubtedly, it is the ASIC and not FPGA. The field programmable Gate Array is meant for general purposes, and ASIC is meant for Specific purposes. And here the application-specific condition holds. We need it for medium production of an image transformation, and this is like Bitcoin which is application-specific. And thus, the correct type of IC which we need in this case is the FPGA, And hence, FPGA is the correct option here.

3 0
4 years ago
What does the Send Backward icon allow a publisher to do?
lianna [129]

Answer:

It reverts to the original image

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • Only business writing requires an editing stage
    8·1 answer
  • How to access files on different computer same network
    14·1 answer
  • Write a function addOne that adds 1 to its integer referenceparameter. The function returns nothing.
    11·1 answer
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • Your wireless network has been breached and it seems as though the attacker has modified a portion of your data that is used wit
    12·1 answer
  • Please help thank u!!!!!
    13·2 answers
  • RUNTIME ORGANIZATION AND DATA LAYOUT.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!