1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
7

What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?

Computers and Technology
1 answer:
padilas [110]3 years ago
8 0

A) copy and copy basepoint  


You might be interested in
Write. true or false​
ella [17]
Um I need a image or smth
8 0
3 years ago
Read 2 more answers
What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
Tamiku [17]

Answer:

Option (b) Integrity

Explanation:

  • Data Integrity refers to the data which is not modified over the process, system.
  • Data Integrity here refers to which is not corrupted over the system in any way.
  • Throughout the life cycle of the process, system the data is intact and can be trusted for the future use.So, option (b) Integrity is the correct option.
  • Option (a) Confidentiality means the data that is kept secret, private but that doesn't mean it is not modified. So, option (a) confidentiality is wrong option.
  • Option (c) Authentication means the user is authenticated to use the data. It means the user has access to the data or not.So, option (c) is wrong option.
  • Option (d) Auditing means to examine, inspect a thing to find it fit for a purpose. Here, data auditing means verifying, inspecting,assessing the quality of data for a process.So, option (d) is wrong option.
3 0
3 years ago
To employ an access key, press and hold down the ____ key as you tap the access key.
Veronika [31]
To employ an access key, press and hold down the Alt key as you tap the access key.
4 0
3 years ago
Does anyone play call of duty cold war campaign. I have a question, please help me.
-Dominant- [34]

Answer:

so please

Explanation:

please upload the question so I can answer ,by the way I don't play call of duty

5 0
3 years ago
Read 2 more answers
________ are small files that browsers store on users' computers when they visit web sites.
Mila [183]
Downloads? It sounds like that might be the answer. Idk.
4 0
3 years ago
Other questions:
  • Maggie is preparing a business report. Which types of keys will she use to type out words and numbers?
    6·2 answers
  • Categories of functions specified by computer instruction?
    11·1 answer
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • 18. Using the same formatting elements and designs across slides in a presentation is important to develop?
    5·1 answer
  • Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method
    9·1 answer
  • Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
    10·1 answer
  • ____ is an iterative software development process that focuses on team productivity and delivers software best practices to all
    13·1 answer
  • Accepting criticism is a trait of what people?
    5·1 answer
  • When a router forwards incoming packets closer to their destination hosts, this is called?
    9·1 answer
  • Write a program that prompts the user for a word or phrase, and determines if the entry is a palindrome. A palindrome is a word
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!