DatCom Blog

Tip of the Week: How to Replicate and Relocate Text Easily

Tip of the Week: How to Replicate and Relocate Text Easily

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can cut, copy, and paste content in effectively any program you use.

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

What Cloud Applications Are You Using?
Fingers Crossed! The Robocalls May Soon Stop
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security User Tips Google Hosted Solutions Microsoft Hackers Tech Term Software Mobile Devices Malware Backup Internet Business Data Backup Innovation Smartphones Communications Hardware Productivity Data Email VoIP Workplace Tips Small Business Smartphone IT Services Business Continuity Android Cloud Computing Data Recovery Computer Router Cybersecurity Communication Managed IT Services Disaster Recovery Ransomware Network Artificial Intelligence Browser Internet of Things Efficiency Alert Chrome IT Support Outsourced IT Windows 10 Cybercrime Law Enforcement Windows 10 How To Applications Mobile Device Server Gadgets Office 365 Business Management Money Collaboration Computers Password Windows Miscellaneous Facebook Passwords Information Virtualization Word Holiday BDR Saving Money Spam Social Media Managed IT Services Wi-Fi Telephone Systems Productivity Keyboard Encryption Private Cloud Microsoft Office Office Phishing Save Money Connectivity BYOD Voice over Internet Protocol Managed Service Data Security Flexibility Apps Operating System Two-factor Authentication Data Protection Government App Mobility Vulnerability Social Engineering Avoiding Downtime Settings Quick Tips Mobile Device Management Work/Life Balance Health Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Paperless Office Google Drive Human Resources Spam Blocking End of Support VPN Upgrade Machine Learning Public Cloud Virtual Assistant Remote Computing Office Tips IT Plan Business Intelligence Fraud Access Control Managed IT Bring Your Own Device Botnet Update Telephone System Telephony Unsupported Software Windows 7 CES Data Breach Software as a Service Sports Data Management Data Storage Content Management Legal Bandwidth Google Docs Automation OneNote Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Social Excel Best Practice Save Time Hosted Computing Remote Worker Recovery eWaste Internet Exlporer FCC Big Data Tools Instant Messaging Apple Search Engine Physical Security History Value Safe Mode Employee Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications HVAC Vendor Tip of the week Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger Virtual Reality Title II Marketing Downtime Password Manager HIPAA iPhone Techology Bing Netflix Staff Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Enterprise Content Management Display Windows 10s Windows Server 2008 Hacking Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Internet exploMicrosoft Cleaning Worker Commute Online Accountants Wireless MSP Root Cause Analysis Business Mangement Budget YouTube Help Desk HBO Millennials Users Hybrid Cloud Google Search FENG Scalability Cortana Hiring/Firing Wire Mouse Conferencing Battery Password Management Security Cameras Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Outlook Telecommuting File Sharing Search WiFi Gmail Company Culture Workforce Digital Signature Firewall Information Technology Proactive IT Skype Content Travel Google Apps Risk Management Administrator Emails Software Tips Education NIST Hacker Solid State Drive Flash Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology Frequently Asked Questions Document Management Remote Work Practices Patch Management Augmented Reality Meetings How to Recycling Training Managing Stress Shortcuts Net Neutrality PDF Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure Advertising Samsung Cryptocurrency Smartwatch Audit Video Games Online Shopping Smart Tech Current Events Addiction USB Vendor Management Television CrashOverride Bluetooth IT solutions Troubleshooting Transportation Shadow IT Books Public Computer Loyalty Safety Wireless Technology Benefits Managed Service Provider Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Rootkit Compliance Employer Employee Relationship Two Factor Authentication Twitter Content Filtering Assessment Regulation ISP Computer Accessories Webinar Printers