1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
6

What operation leaves the original information unchanged?

Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
7 0

Answer:

Cut, Copy and paste operations leave the original information unchanged.

Explanation:

Copy and paste can be performed to get the data or value duplication. Copy can be done by using "ctrl + c" Keys and paste can be done by "ctrl + v" keys.

Cut operation is used to move the data from one place to another in same pattern. This operation can be performed by using "ctrl + x" keys and data can be moved on desired location by using "ctrl + v) keys.

You might be interested in
What is the relation between Information and Data?
Rudiy27

Answer:

In a sentence: data is raw numbers, while information is organized data.

Explanation:

Data is a series of numbers or facts.  A data set is a collection of data that are related (for examples all the students result in your last math exam).  But it's not organized by itself... and rarely mean anything when looked at it in a raw manner.

To make sense of a data collection, you have to analyze it, calculate the mean or median of the data set for example... this is a treatment that has to be done to a data set to give it significance.. after such analysis, the result you have (mean, median, etc..) is a piece of information devired from the data.

3 0
3 years ago
Now the y0utube home screen is gone
erik [133]

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

7 0
3 years ago
Read 2 more answers
Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
Ilia_Sergeevich [38]
I think it is true (A) 
3 0
4 years ago
Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
Katen [24]

Answer:

Spam

Explanation:

If you receive in bulk the unsolicited messages, then that does mean that your inbox is being spammed. This will not harm you but you will lose the Gb that is allocated to your mailbox. And if you will not check then your mailbox will soon be full, and you might not receive some of the important messages that you should reply to immediately.

6 0
3 years ago
What is the most flexible way to modify a report?
Vesna [10]

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

8 0
3 years ago
Other questions:
  • List two ways that guest could be defined
    12·2 answers
  • You can use predesigned, formatted files called _____ to create new worksheets quickly.
    13·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    12·1 answer
  • What procedures are involved in saving a file for the first time?
    10·2 answers
  • What is meant by encapsulating semaphores? Bring out the need for it
    12·1 answer
  • What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
    6·1 answer
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • Describe how to add slide numbers and image to a Microsoft power point presentations ?​
    5·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • Im coding and need help please answer or comment to help. any skilled coders comment below
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!