1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
2 years ago
14

Ok so I know this is the most random question to ask on brainly, but does anyone know how to copy on placement in sims 4 for pc?

And I'm not talking about the eyedropper bc I want to copy ON PLACEMENT, as in when u place an object and then it keeps duplicating. I've done it before on Xbox, but idk how to do it on pc... Anyways ill give brainliest if it works and u know how bc I've been playing on pc for almost a year and still don't know how to do it lol. Thanks! ◕⩊◕
Computers and Technology
2 answers:
Evgen [1.6K]2 years ago
8 0
I’m not quite sure what you mean by ‘copy on placement’ but if you mean what I think you mean then here.
Press shift
Let me know if thats wrong and I’ll give you the right answer:)
pochemuha2 years ago
3 0

Answer:

yes i do i will tel you if you put brainlist

Explanation:

You might be interested in
Which of the following statements is false? Question 4 options: By convention class names begin with an uppercase letter, and me
amm1812

Answer:

Instance variables can be declared anywhere inside a class.

Although there isn't any rule to declare instance variables before methods, and they can be declared anywhere in the class, they cannot be declared inside method definitions of class.

///////////////////////////////////////////////////////////////////////////////////////////////////////////

<em>By convention class names begin with an uppercase letter, and method and variable names begin with a lowercase letter.</em> - True.

<em>Instance variables exist before methods are called on an object, while the methods are executing and after the methods complete execution.</em> - True.

<em>A class normally contains one or more methods that manipulate the instance variables that belong to particular objects of the class.</em> - True

8 0
3 years ago
Read 2 more answers
What do you call a firewall that is connected to the internet, the internal network, and the dmz?
Firlakuza [10]
<span>Three-pronged firewall hope this helps!</span>
3 0
3 years ago
Is there a way to search your computer for all music files on it?
Slav-nsk [51]
Yes their is a way go to your downloads see if you have some thing or their shall be something that you can type in your computer and find something or you can go to Youtube or google and they can show you a video or some articles.
5 0
3 years ago
Clickstream tracking tools collect data on customer activities at web sites (true/false)?
Galina-37 [17]

Clickstream tracking tools collect data on customer activities at websites- true.

<h3>what is the website?</h3>
  • A website, often known as a website, is a collection of web pages and associated material that is published on at least one web server and given a shared domain name.
  • The World Wide Web is the aggregate name for all publicly accessible websites.
  • A company's internal website for its workers is an example of a private website that can only be viewed via a private network.
  • Most websites focus on a single subject or objective, including news, education, business, entertainment, or social networking.
  • The navigation of the website, which frequently begins with a home page, is aided by hyperlinks between web pages.

To learn more about website, refer to the following link:

brainly.com/question/9060926

#SPJ4

3 0
1 year ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
Other questions:
  • What does this say:<br> √ans
    6·2 answers
  • Name types of operating system with example
    5·1 answer
  • Qbasic program to accept 10 numbers and to find their sum. <br>​
    7·1 answer
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • Choose the true statement below. Question 8 options: A) The content that displays in the browser is contained in the head sectio
    9·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • How many dog breed are there
    9·2 answers
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
  • 1. A cell is identified by its ........
    8·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!