1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
10

Gabe wants to move text from one document to another document. He should _____. highlight the text, select the cut command, move

to the new document, make sure the cursor is in the correct location, and select the paste command copy the text, paste the text, and open the new document highlight the text, open the new document, and press Ctrl and V select the save as command, navigate to the new document, and click save
Computers and Technology
1 answer:
avanturin [10]3 years ago
7 0

Answer:

Gabe wants to move text from on document to another document. He should <u>highlight the text, select the cut command, move to the new document, make sure the cursor is in the correct location, and select the paste command</u>

Explanation:

In order to move or copy text from one document to another, the text to be moved or copied is highlighted by clicking and holding down the left mouse button before the text area and then moving the mouse cursor to the end of the text area to be cut or copied while still holding down the left mouse button

On getting to the end of the text area to be cut or copied, release the left mouse button and press Ctrl + X buttons simultaneously, on the keyboard to cut or Ctrl + C  buttons simultaneously, on the keyboard to copy

Place the mouse cursor at the point in the document where the text is to be pasted and press Ctrl + V simultaneously, on the keyboard to paste the text.

You might be interested in
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Which of the following functions grows at a faster rate than the rest? (Points : 6)
ehidna [41]

Answer:

n2.

Explanation:

The function with the time complexity of n2 is the fastest growing function is in terms of square.As n increases the time complexity will grow very rapidly.

n=1   n2=1

n=2   n2=4

n=3   n2=9

n=4   n2=16

n=5   n2=25.

The slowest growing function among them is log n then n and then n log n.

n log n is better than n2.

4 0
3 years ago
What is output? x = 10 if (x &gt; 10): print(1) elif (x = 10): print(3) else: print(4)
nikdorinn [45]

Answer:

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

Explanation:

3 0
3 years ago
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
If you want to create programs with more detailed images, maybe even characters that you could interact with, what pieces of inf
Oliga [24]

The pieces of information needed in the code to create a more detailed program are the sprite objects

<h3>What are sprites?</h3>

Sprites are program objects that are used in a program to add more features such as detailed images, characters and animations in the program.

The sprite objects are dragged and dropped on the program

Hence, the pieces of information needed are the sprite objects

Read more about object-oriented program at:

brainly.com/question/25649719

6 0
2 years ago
Other questions:
  • Programmers say the data items are ____ only within the module in which they are declared.
    5·1 answer
  • Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
    9·1 answer
  • Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE"
    5·2 answers
  • Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
    14·1 answer
  • How can I get answers on Collage Board for AP classes when using the inspect element? (AP WORLD HISTORY)
    13·1 answer
  • 1. Consider a database with object X and Y and assume that there are two transactions T1 and T2. Transaction T1 reads objects X
    5·1 answer
  • Describe a common error that presenters make during their presentation and how to remedy the error​
    12·2 answers
  • 12. Realizar un algoritmo que genere un número aleatorio, el usuario debe adivinar cual es el número generado para esto tendrá 3
    10·1 answer
  • Did you know you can buy a Passport Online?
    12·2 answers
  • Directions: Give the shortcut key for the following commands: 1. Open 2. Save 3. New document 4. Copy 5. Undo 6. Redo 7. Paste 8
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!