Error
  • Error loading component: com_advancedmodules, 1

Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Fascinating History of the Cut, Copy, and Paste Shortcuts

The Fascinating History of the Cut, Copy, and Paste Shortcuts

Technology can do some incredible things, but there’s a reason why basic tools still remain popular even to this day. It’s because they cracked the code for productivity, and they are so easy that anyone can use them. For example, there’s the Cut, Copy, and Paste commands that can be used in literally any application out there.

Cut and Paste Are Remnants of the Traditional Editing Processes

Back in the day, manuscripts would be edited by physically cutting up pages and pasting them back together in a different order, hence the name.

This practice was popular up until the 1980s, only fading in response to the word processor. There used to be long scissors used specifically for this task, as they could cut through a whole page during the editing process. These days, computers are capable of doing so much more, as you can simply use the Cut and Paste processes for these purposes in a much easier and less manual way.

In fact, the Copy function further invalidates this practice, along with the Undo and Redo functions, relegating this physical activity to become a relic of the past.

Here’s a Quick Shortcut Reminder

It’s easy to forget keyboard shortcuts when they’re not used day-to-day, so we’ve put together a short list of these helpful strokes here:

  • Cut - Ctrl+X
  • Copy - Ctrl+C
  • Paste - Ctrl+V
  • Undo - Ctrl+Z

Just remember, technology has allowed you to make these tasks less manual and more streamlined. Imagine where else in your business you can do the same!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Compliance Training Covid-19 Gadgets Cloud Computing Server IT Support Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Blockchain Business Technology Vendor Bandwidth Windows 10 Virtualization Two-factor Authentication Mobile Office Data Security Managed Services Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Voice over Internet Protocol Employer-Employee Relationship BYOD Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 HIPAA Marketing Applications Password Managed IT Services How To BDR Conferencing Risk Management Virtual Private Network Computers Health Analytics Website Office Tips Router Augmented Reality Retail Storage Bring Your Own Device 2FA Help Desk Big Data Healthcare Operating System Customer Service Cooperation Free Resource Project Management Display Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Solutions Document Management Firewall Windows 11 Scam Data loss Monitoring The Internet of Things Excel Social Going Green Patch Management Remote Workers Save Money Managed IT Service Remote Monitoring End of Support Vulnerability Telephone Vendor Management Cybercrime YouTube Meetings VPN Entertainment Vulnerabilities Cryptocurrency Data Privacy Hacking Images 101 Presentation Computer Repair Virtual Desktop Multi-Factor Authentication Mobility Telephone System Data storage LiFi Wireless Technology Cost Management Outlook Machine Learning Employees Money Humor Word Integration User Tip Modem Processor Maintenance Mobile Security Antivirus Sports Holidays Mouse Safety Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Settings Wireless Downloads Printing Content Filtering iPhone IT Management Customer Relationship Management Licensing Cyber security Network Congestion Multi-Factor Security Tech Human Resources Social Network Telework Google Drive User Error CES Competition IoT Communitications Knowledge Dark Web Cables Trends Supply Chain Management Point of Sale Regulations 5G Google Calendar Term Google Apps Customer Resource management FinTech Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Bitcoin Network Management Gamification Flexibility Running Cable Tech Support User Staff Value Business Intelligence Social Networking Monitors Legislation Shortcuts Google Wallet Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Windows 8 IP Address Content Remote Working Laptop Websites Wearable Technology Memory Vendors Health IT Motherboard Data Breach Comparison Google Play Be Proactive Drones SharePoint Directions Videos Assessment Electronic Health Records Electronic Medical Records Permissions Workforce Wasting Time Threats Halloween Recovery Hard Drives Trend Micro Writing Specifications Security Cameras Workplace Strategies Lenovo Microchip Domains Internet Exlporer Software as a Service Virtual Reality Fraud Meta Managing Costs Amazon Hacks Server Management Username Scary Stories Private Cloud Identity Theft Refrigeration eCommerce Fun Black Friday SSID Superfish Deep Learning Public Speaking Database Surveillance Twitter Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Lithium-ion battery Error Proxy Server Reviews Education Cookies Social Engineering Entrepreneur Cyber Monday Medical IT Tactics Development Remote Computing Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Mobile Computing Shopping Tablet Undo Nanotechnology Optimization Search PowerPoint Best Practice Addiction Alert Language Employer/Employee Relationships Outsourcing Buisness File Sharing Chatbots Dark Data Navigation Managed IT Management PCI DSS Legal Gig Economy IT solutions Screen Reader How To Distributed Denial of Service Workplace Business Growth Service Level Agreement Internet Service Provider Notifications Computing Infrastructure Teamwork Hiring/Firing Travel Application Identity Evernote Paperless Regulations Compliance Techology Bookmark Google Maps Smart Tech Memes Cortana Co-managed IT Alt Codes IBM Download Net Neutrality Alerts SQL Server Technology Care Downtime Unified Threat Management History Business Communications Financial Data Unified Threat Management Browsers Smartwatch Hosted Solution Connectivity IT Break Fix Scams Typing Upload Procurement Azure Hybrid Work

Blog Archive