1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
6

With ____ editing, word automatically displays a paste options button near the pasted or moved text.

Computers and Technology
1 answer:
lyudmila [28]3 years ago
8 0

Answer:

With drag-and-drop editing, word automatically displays a paste options button near the pasted or moved text.

Explanation:

<u>Option A:</u> Cut and paste option is invalid because, cut and paste option does not provide paste symbol near the copied text. This option and cut and paste a selected text.

<u> Option C :</u> Inline is invalid in this context

<u>Option D: </u>Copy and Carry is not valid because the option “copy” is available where as carry is not available.

<u>Option B:</u> Drag and drop is the right answer because, it provides paste option by using this feature. A text can be drag and drop by selecting the text and dragging the mouse with the left click

You might be interested in
Which of the following statements is true of alert files?
ozzi

Answer:

They are only generated by Wireshark.

3 0
3 years ago
What are the consequences of digital footprint ?
tekilochka [14]

Answer:

The digital footprint that is left behind can have repercussions in all areas of your teen's life, potentially resulting in missed job opportunities, public sharing of personal information, ruined relationships — or, in what is likely more relevant to them right now: Their parents finding out what they've been up to

Explanation:

8 0
2 years ago
Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D
Papessa [141]

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

3 0
3 years ago
Read 2 more answers
How can ascii be used to represent characters in computer system
Furkat [3]

It is a code for representing 128 English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.

7 0
3 years ago
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
matrenka [14]

names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]

names.sort()

for x in names:

   if x == "Thor":

       break

   else:

       print(x)

I made up my own names for the sake of testing my code. I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
Other questions:
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
    12·1 answer
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • What number system do people in America use?
    10·2 answers
  • Definition: This modern-day country was one of the most advanced ancient civilizations. Human
    8·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • ____ is a technique for confirming that q received packet or frame is likely to match what was sent
    15·1 answer
  • Which program will have the output shown below?
    11·2 answers
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!