1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
3 years ago
13

What is copy and paste?

Computers and Technology
2 answers:
Anna [14]3 years ago
8 0

Answer: copying something and then putting it some where else Ctrl+C and Ctrl+V

Explanation:

AlexFokin [52]3 years ago
6 0
Adding text or image to your clipboard, a virtual volatile store, and pasting them in a word document or something

You might be interested in
When youre working with a word processing document and you press the Del key what happens
REY [17]
Typically, "Del" stands for "delete."
Most times, this key will do different things depending on the type of keyboard/computer you have. For example, on macs, the "delete" key is also the backspace key, so it will delete the last character you typed. However, on most pcs, the "delete" key will delete characters you typed that are in front of your cursor.
5 0
3 years ago
18. The push rod connects to the _______, which is designed to pivot back and forth to open and close the valve.
spin [16.1K]
In an overhead valve engine, pushrods connect to A. rocker arm which pivots and opens valves
6 0
3 years ago
Read 2 more answers
What is the name of the hardware device that is used to write the data from hard disk to CD​
mart [117]

it is called a disk drive

4 0
2 years ago
Read 2 more answers
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Slack space most commonly contains visible data. True or false?
Ivanshal [37]
That is so True because slack space mostly has visible dada
7 0
2 years ago
Other questions:
  • If you receive an increase in pay, how will that affect your payroll deductions?
    8·1 answer
  • What is the best way to protect computer equipment from damage caused by electrical spikes?
    9·2 answers
  • The _____ handles the instructions for your computer to start up before the operating system is loaded.
    11·1 answer
  • 11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S
    6·1 answer
  • Which is the best programming practice?
    6·1 answer
  • If I wanted to include a picture of a dog in my document, I could use _____. SmartArt WordArt clip art AutoCorrect
    13·1 answer
  • Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou
    5·1 answer
  • Why do we install doorbells in our house
    11·2 answers
  • The rectangle shape in flowchart is used for
    12·1 answer
  • MmfbfMMMMMMMMMMMMMMMMMmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!