1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
15

Rachel typed two paragraphs and then realized she was in the wrong document. What steps should Rachel follow to quickly move the

text to the correct document? A.) Highlight the two paragraphs, select the copy command, place the cursor in the new document, and select the paste command.
B.) Place the cursor in the new document, select the paste command, highlight the two paragraphs, and select the cut command.
C.) Click twice on the paragraph, press delete, place the cursor in the new document, and select the paste command.
D.) Highlight the two paragraphs, select the cut command, place the cursor in the new document, and select the paste command.
Computers and Technology
2 answers:
igomit [66]3 years ago
6 0
It would be A. I hope that this helps!
svet-max [94.6K]3 years ago
4 0
I would use "cut" instead of "copy" (answer D) because if I "copy" the text, it will still remain in the wrong document, but if I "cut" and "paste" then it will actually be removed from the wrong doc and put into the right one.
You might be interested in
How do I use this without the spring?
poizon [28]

Answer:

put a spring in

Explanation:

duuuuuuuu

cy

6 0
3 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
Do You assign the Needs Met rating before assigning the page quality (PQ) rating?
tensa zangetsu [6.8K]
IS GOD REAL.......................?<span>

</span>
6 0
3 years ago
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
2 years ago
How do you use a iPad when it has a password ?
BaLLatris [955]
Take it to the Apple Store and they will help you or you can go on their site and press "Forgot Apple ID." If you choose the second option you have to enter the first and last name, and the email you used for the iCloud on the iPad. 
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is true of a database? a. It is a collection of unstructured data. b. It is accessed primarily
    14·1 answer
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • What will be the output after the following code is executed? def pass_it(x, y): z = y**x return(z) num1 = 3 num2 = 4 answer = p
    7·1 answer
  • What can you find the under the privacy policy section of a shopping website?
    12·1 answer
  • Which type of password would be considered secure
    5·2 answers
  • I have a very quick question. So im applying for Early college and i need some future educational goals and maybe im just thinki
    6·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • How can a cell phone tower help people​
    11·2 answers
  • Jackie created a poster for a rock band. Which file format will best preserve the graphics? 20PTS​
    14·2 answers
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!