1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
9

10 points + brainliest to first correect answer :) incorrect answers/ answers with no effort will be deleted this is easy im jus

t making sure :)
Which of these is not the correct method for moving text in a document in Word 2016?
Select the text, press Ctrl+C, move the insertion point to desired location, and press Ctrl+V.
Select the text, right-click on the text and select "Cut," move the insertion point to the desired location, and press Ctrl+V.
Select the text, click the Cut button, move the insertion point to the desired location, and click the Paste button.
All the above statements are correct.
Computers and Technology
1 answer:
Gala2k [10]3 years ago
6 0

Answer:

The first option is incorrect

Explanation:

With the Control+C method, you copy the text. With the Control+V method, you paste it. You do not remove any of the text and instead create a duplicate

You might be interested in
Using a graphic organizer in the prewriting can do all of the following except what?
ikadub [295]
A. organize the writers thoughts 
<span>B. help narrow the writers topic </span>
<span>C. research a writers story** </span>
<span>D. help make the writing more detailed.</span>
5 0
3 years ago
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
jeyben [28]

Answer:

The answer is "use P2P method".

Explanation:

In Corporation are starting to regard P2P is a method, which enabling workers to transfer files directly, reducing the expenses and construction connected with a central network.

  • It allows corporations to make the use of often latent resources on both the computer for each worker.
  • It will also be forced to control access to data to protect the privacy and sensitive materials, and will also be able to encrypt files by code.

5 0
3 years ago
A computer with more than one operating system installed is referred to as a _____ system.
Natalija [7]
Dual-Boot system, because the computer hosts more than one operating system, usually 2.
7 0
3 years ago
Eight houses represented as cells are arranged in a straight line java int state []
monitta

Answer:

int state[] = new int[8];

8 0
4 years ago
Convert each of the following base 10 &amp; base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
asambeis [7]

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

7 0
3 years ago
Other questions:
  • PLEASE HELP!!!!!!!!!!!
    11·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • In a set associative cache memory, if the number of ways (lines) in a set is doubled while keeping the cache size and line size
    13·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • When photographing wildlife, what type of lighting should you use?
    15·2 answers
  • You are trying to connecting your laptop to your new 52" LED TV using an HDMI connector. When you connect everything, you immedi
    15·1 answer
  • Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of h
    14·1 answer
  • ______ norms are usually unstated rules that regulate members' interaction.
    12·1 answer
  • What is the purpose of each component ?
    6·1 answer
  • 2
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!