fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Tip of the Week: How to Replicate and Relocate Text Easily

Tip of the Week: How to Replicate and Relocate Text Easily

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can cut, copy, and paste content in effectively any program you use.

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

What Cloud Applications Are You Using?
Fingers Crossed! The Robocalls May Soon Stop
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Meetings OLED CES Scam Facebook Bring Your Own Device Relocation Network Security Files Website IT Plan Productivity Keyboard VoIP Data Storage Data Security Mobile Computing IT Management Botnet Smartphone Miscellaneous Information Authentication Email VPN Google Apps Software as a Service Law Enforcement Windows 7 Business Management YouTube Tip of the week Windows Data Workforce Trending Cryptocurrency IT Services Emergency Identity Theft Outlook Content Management Current Events Word Bandwidth Business Computing Microsoft Office Windows 10 Blockchain Apps Paperless Office Telephony Smartphones Network Ransomware Unsupported Software User Tips Data Recovery Hackers Human Resources Comparison Gadgets Software Windows 10 Save Money Entertainment Password Malware Software Tips Collaboration Microsoft Gmail Chrome Augmented Reality Saving Money Phishing Private Cloud Quick Tips Mobile Device Management Managed Service Wi-Fi Passwords Backup Employer-Employee Relationship Internet of Things Managed IT Services Proactive IT Holiday Virtualization Google Docs Electronic Medical Records Business Continuity Downtime Cybersecurity Google Networking Communication Alert Business Intelligence Apple Outsourced IT Technology BYOD Two-factor Authentication Sports Hardware End of Support Remote Monitoring Amazon Hybrid Cloud Encryption MSP Best Practices Access Control Virtual Assistant Education Redundancy Settings Spam Blocking Managed IT Services Camera Cloud Computers Managed IT Data Backup Router Security Cameras Tech Term Social Media Avoiding Downtime Small Business Cloud Computing Browser Upgrade How To Value Spam Communications Recovery Innovation Health Voice over Internet Protocol Efficiency Tip of the Week Display Mobile Devices Google Drive Thought Leadership IT Support Infrastructure Artificial Intelligence Server Training Fraud Android Administrator HaaS Automation Servers Hosted Solutions Root Cause Analysis Government BDR Update Telephone Systems Enterprise Content Management Disaster Recovery Multi-Factor Security Net Neutrality Cast Data Breach Operating System Telephone System Privacy Staff Connectivity OneNote Security Social Engineering Computer Internet Exlporer Computer Fan Workplace Tips Applications Sync Machine Learning Twitter Users Telecommuting Public Cloud Business Cybercrime Data Protection Internet Vulnerability Wireless Mobile Device App Office 365 Money

Newsletter Sign Up