DatCom Blog

Tip of the Week: How to Replicate and Relocate Text Easily

Tip of the Week: How to Replicate and Relocate Text Easily

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can cut, copy, and paste content in effectively any program you use.

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

What Cloud Applications Are You Using?
Fingers Crossed! The Robocalls May Soon Stop


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Hackers Microsoft Business Computing Hosted Solutions User Tips Malware Tech Term Internet Business Google Software Backup Hardware Innovation Data Backup Mobile Devices Email Smartphones Data Communications Business Continuity VoIP Android Data Recovery Small Business Workplace Tips Computer Managed IT Services Cloud Computing Ransomware Smartphone Cybersecurity Browser Communication IT Services Chrome Law Enforcement Disaster Recovery Windows 10 Alert Outsourced IT Cybercrime Network Applications Business Management Internet of Things Efficiency IT Support Office 365 Computers Password Money Collaboration Windows 10 Windows Productivity Server How To Miscellaneous Artificial Intelligence Router Gadgets Virtualization Word Saving Money Social Media BDR Spam Productivity Information Telephone Systems Facebook Managed IT Services Passwords Phishing Voice over Internet Protocol Operating System Microsoft Office Data Security Save Money Government App BYOD Mobile Device Two-factor Authentication Holiday Flexibility Apps Data Protection Vulnerability Mobility Quick Tips Social Engineering Connectivity Mobile Device Management Avoiding Downtime Wi-Fi Office Managed Service Keyboard Work/Life Balance Human Resources Office Tips Public Cloud Google Drive Spam Blocking Entertainment Telephone System VPN Upgrade IT Plan Business Intelligence Software as a Service Sports Fraud Remote Computing Bring Your Own Device Update Unsupported Software Managed IT Telephony CES Windows 7 Data Breach Servers Content Management Health Paperless Office Data Storage Settings Bandwidth Google Docs Data Management OneNote Comparison Blockchain Redundancy Private Cloud Legal Employer-Employee Relationship IT Management Identity Theft End of Support Scam Networking Virtual Assistant Website Encryption HaaS Infrastructure Remote Monitoring Specifications Value YouTube Help Desk Recovery Computer Fan Sync Evernote Electronic Medical Records MSP Best Practice Criminal Experience Charger Wire Mouse Instant Messaging Tip of the week Credit Cards Inventory Internet exploMicrosoft IBM History Knowledge Data loss Thought Leadership Mobile Computing Netflix Title II Password Management IT Support Downtime Password Manager HIPAA Wireless webinar Staff Company Culture The Internet of Things Wireless Charging Users Hybrid Cloud File Sharing Cleaning Administrator Windows 10s Windows Server 2008 Access Control Supercomputer Network Congestion Virtual Reality Screen Mirroring Camera HBO Online Accountants NIST Root Cause Analysis Botnet Business Mangement Budget Conferencing Hacking Millennials Managing Stress Shortcuts FENG Cortana Information Technology Hiring/Firing Augmented Reality Multi-Factor Security Music Computer Care Smart Office Microchip Amazon Authentication IT Consultant Worker Commute Cast Addiction Scalability Outlook Telecommuting Automation Cryptocurrency Battery WiFi Gmail Remote Worker Emails Automobile Software Tips Workforce Digital Signature Firewall Black Market Skype Travel Google Apps Risk Management Trending Wearable Technology Search Engine Search Solid State Drive Flash Amazon Web Services Nanotechnology Advertising Leadership Training Cache Warranty Content Frequently Asked Questions Remote Work Practices Internet Exlporer Patch Management Safe Mode Education Meetings Recycling Wiring Net Neutrality PDF Apple HVAC Start Menu Workers Politics USB Samsung Machine Learning Bing How to Audit Online Shopping Smart Tech Current Events Document Management eWaste Wireless Internet Printer Audiobook Excel Hosted Computing Computing Infrastructure Devices Unified Threat Management Video Games Physical Security FCC iPhone Big Data Techology Enterprise Content Management Tools Marketing Safety Troubleshooting Save Time Transportation Managed Service Provider Books Public Computer Loyalty Shadow IT Benefits Compliance Twitter Worker Wireless Technology Hosted Solution SaaS Smart Technology Regulation Rootkit Printers Emergency Employer Employee Relationship Two Factor Authentication Business Owner Webinar Content Filtering Assessment Computer Accessories Vendor Management IT solutions Television CrashOverride Bluetooth