253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Tip of the Week: How to Replicate and Relocate Text Easily

Tip of the Week: How to Replicate and Relocate Text Easily

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can cut, copy, and paste content in effectively any program you use.

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

What Cloud Applications Are You Using?
Fingers Crossed! The Robocalls May Soon Stop


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows Marketing Telephone Systems Communications Networking Fraud Bring Your Own Device Browser Infrastructure Managed IT Services Cache User Tips CES Password Network Security Cybersecurity Innovation IT Management Android Blockchain Update Screen Mirroring Efficiency IT Plan Internet Encryption Outsourced IT Passwords Google Security Quick Tips Paperless Office Data Recovery Workplace Tips eWaste Ransomware Technology Office 365 Applications Search Engine Facebook Vulnerability Unsupported Software Mobile Device Management IBM Data Breach Phishing Cloud FCC Skype Social Botnet VoIP Computers NIST Connectivity Computer Law Enforcement Remote Monitoring Mobile Device Internet Exlporer Spam Alert Content Management Microsoft Office Data Protection Comparison Servers Document Management Information VPN Cybercrime Vendor Email Scam Electronic Medical Records Privacy Cast Virtualization BDR Employee Managed Service Business Continuity Evernote Social Engineering Keyboard Best Practices Mobile Devices Hiring/Firing Google Drive Hosted Solutions Tech Term Telephone System IT Services Hardware Settings Voice over Internet Protocol Windows 7 How To Wi-Fi Managed IT Software Tips Software as a Service Chrome Upgrade Relocation Redundancy Tip of the Week IT Support Criminal Hacker Data Security Data Computer Fan Money Miscellaneous Business Intelligence Data Backup Smart Tech Cryptocurrency Emergency Safety HIPAA The Internet of Things WiFi Public Cloud App Private Cloud Entertainment Managing Stress Word Windows 10 Saving Money Wiring Travel Smartphone Two-factor Authentication Downtime Avoiding Downtime Save Money Data Storage Disaster Recovery Human Resources Files Telephony Website Remote Worker Network Spam Blocking Warranty Specifications Malware Small Business Software Smartphones Social Media Automation Machine Learning Sports Health Router Windows 10 Online Shopping Microsoft Gadgets Google Docs Value Productivity Employer-Employee Relationship Hackers Access Control Cloud Computing Current Events Communication BYOD Business Start Menu Server Internet of Things Business Management Backup Collaboration Artificial Intelligence Bandwidth Hosted Computing OneNote Managed IT Services Government Hybrid Cloud Outlook Apps Virtual Assistant Root Cause Analysis Operating System Business Computing Office Identity Theft Augmented Reality Holiday Addiction

Newsletter Sign Up