1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
8

How do you copy and paste

Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
7 0

Answer:

So depends on the site. If it is your phone you hold on the word or beginning of the sentence. Then, two blue dots will pop up. You drag it to select what you want. Then, once you let go, The words 'copy, paste, select all' should pop up. Click copy. Got to your notes or something, Hold the blank space and click paste. For computer it is almost the same thing. Use a mouse(shift+arrow key) and drag it on what you want to select. Then, press control C. Finally, go to your doc and type control v, it should pop up. Note!: You won't be able to copy and paste everything due to the website.

AVprozaik [17]3 years ago
5 0

Answer:

ctrl+c=copy

ctrl+v=paste

Explanation:

You might be interested in
How do you think calculator of a computer works? describe the procedure.
Leviafan [203]

Explanation:

calculators work by processing information in binary form. We're used to thinking of numbers in our normal base-ten system, in which there are ten digits to work with: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. The binary number system is a base-two system, which means there are only two digits to work with: 0 and 1. Thus, when you input numbers into a calculator, the integrated circuit converts those numbers to binary strings of 0s and 1s.

The integrated circuits then use those strings of 0s and 1s to turn transistors on and off with electricity to perform the desired calculations. Since there are only two options in a binary system (0 or 1), these can easily be represented by turning transistors on and off, since on and off easily represent the binary option

Once a calculation has been completed, the answer in binary form is then converted back to our normal base-ten system and displayed on the calculator's display screen.

8 0
4 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
How does an individual's access to a wide range of online services affects their ability to operate safely in the digital world.
S_A_V [24]
Nothing online is safe anymore!!!! People and even the government can get hacked easily with today's technology.You can search someone easily on websites like Google or Facebook and even read someone's tweets on Twitter because their account is not private. But what's the point of saying private if they can easily get hacked by someone. There is no safety these days that is why you have to be careful with what you post on the internet in general.
6 0
3 years ago
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size
Rom4ik [11]

Answer:

Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming

i don t know

7 0
3 years ago
Difference between batabse and database management system
adelina 88 [10]

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

4 0
3 years ago
Other questions:
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • The appropriate length for an e-mail is about half the amount of text that will fit on an 8 1/2' by 11' page.
    11·2 answers
  • (Java)
    12·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • What are the benefits of maintaining you vehicle?
    11·1 answer
  • A device that converts sound waves into an electronic signal that is transmitted through wires is a _______ transmitter.
    7·1 answer
  • Write a program that prompt the user to enter the coordinate of two points (x1, y1) and (x2,y2), and displays the slope of the l
    10·1 answer
  • The primary reason for a company to outsource jobs is to
    8·2 answers
  • HELP ASAP IF YOU KNOW PYTHON 2!!!
    15·1 answer
  • What can be changed when a style is modified?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!