1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
3 years ago
10

What is the keyboard shortcut for pasting?

Computers and Technology
1 answer:
denpristay [2]3 years ago
8 0
 The short cuts for all of the keys are ctrl v (paste) , ctrl c (copy) , ctrl p ( print) ctrl A ( select all ) , ctrl s (save)  ctrl J ( view downloads ) ctrl f (find on page ) ctrl w ( close all tabs )  ctrl H ( history) <u />ctrl U (underline ) ctrl T (open new tab)
ctrl M [reading list] ctrl+alt+delete {help } all performed on windows 10
<em />
You might be interested in
Henry is designing a document for his architecture project. In which order should Henry preform the different tasks that are req
nadezda [96]

It is

Select an appropriate layout

Decide which current format...

Import or compose...

Proofread...

Check the print preview..

4 0
3 years ago
What does the windows update feature allow you to do?
Mariulka [41]
The answer is D
Explanation: none
3 0
3 years ago
Read 2 more answers
Please help explain this calculator code.
goblinko [34]

Answer:

i dont know ask the calc to do it. hehe

Explanation:

7 0
4 years ago
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
oksano4ka [1.4K]

Sending potentially sensitive information by email

Potentially sensitive information can be sent via Email only if the Email is encrypted

Explanation:

No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.

7 0
4 years ago
What changes do you need to a algorithm to compare 100 numberst
Aliun [14]

Answer:

It really depends - in general every data structure has its use.

Explanation:

Furthermore, traversing the list will be inefficient because the data items are not contiguous in memory, forcing the CPU to jump all over the RAM memory causing further slowdown.

3 0
4 years ago
Other questions:
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • The assignment of numeric codes to characters follows a specific order called a(n) _____.
    15·1 answer
  • The intensity of force acting on a rock body is expressed as
    14·1 answer
  • Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
    8·1 answer
  • Gta? 5 or gta 4? orrrr gta 3? what do you think?
    11·2 answers
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • What type of light comes from reflections off other objects?
    5·1 answer
  • Is hp pavilion pc a digital or analog computer
    8·1 answer
  • Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in cell C4 as the Lookup
    9·1 answer
  • Using a microphone to record a sound on your computer is an example of:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!