1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
6

Select all that apply. When you cut text from a document, you may: leave it in the clipboard paste in into another document past

e it in another location in the same document copy it into another location
Computers and Technology
2 answers:
Len [333]3 years ago
5 0

Answer: When you Cut selected text you remove it from the place where it is and place it in the Windows 95 Clipboard. When you Copy selected text, you leave it in the place where it is and place a copy of it in the Clipboard. When you Paste something that you have cut or copied, you place it in another part of your document.

Leni [432]3 years ago
3 0

Answer:

copy it into another location

Explanation:

You might be interested in
Filtering is a function of _____.
Levart [38]
The answer is: switches.

Explanation:

Filtering is a function of switches.
3 0
2 years ago
The ____________________ chip handles the functions of the keyboard controller.
RoseWind [281]
I think the ROM chip handles the functions of a keyboard controller.
7 0
3 years ago
Why does fiber optic communication technology have a significant security advantage over other transmission technology? higher d
erik [133]
Higher data rates can be transmitted Hope this helps!
7 0
3 years ago
Match the feature to the network architecture,
pochemuha

Answer:

Answer is:  

Client-Server Network

  • expensive to set up
  • has a central server
  • easy to track files
  • useful for a large organization

Peer-to-peer Network

  • useful for a small organization
  • difficult to track files
  • inexpensive to set up
  • does not have a central server

Explanation:

<em>Client-Server Network is ideal for bigger network set up like offices and companies where there will be a central server involved with several clients to access and connected with the server. This is the normal network set up to companies. While, Peer to peer network is ideal for much smaller network, which consists of only two computers to communicate and share files. This network is normally temporary and inexpensive since in only works with two computers.</em>

7 0
4 years ago
___ allow users to select controls by keyboard shortcuts. (Points : 3) Alternative keys
PtichkaEL [24]

Answer: Alternative key

Explanation:

 The alternative key is the type of shortcut key in the keyboard that allow the users for selecting the control or shift key. It is also considered as the modifier key. For using the alternative key we must ensure that the lock num is ON in the keyboard.

The alternate key is basically provide the various alternative input and the operation. The short name of the alternate key in the keyboard is denoted as "Alt key". The function of the alternative key may vary from one application to another.    

3 0
3 years ago
Other questions:
  • Select the best answer for the question. 19. While broadcasting a football game, the announcer exclaimed, "I can't believe it. C
    7·2 answers
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • _____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution b
    10·1 answer
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • Suppose you are working in a computer lab during the work you are facing window failure or other technical issues.How you will s
    12·1 answer
  • Write an alogrithm to display the first ten even numbers​
    6·1 answer
  • चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
    11·1 answer
  • to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will
    13·1 answer
  • What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!