Where is the copied / copied data from an application stored ?

1 Answer

Answer :

Copied / copied data from an application is stored on the clipboard.

Related questions

Description : Data that is copied from an application is stored in the- 1) Driver 2) Clipboard 3) Terminal 4) Prompt

Last Answer : 2) Clipboard

Description : The following are electronic record a) Record which is printed on a paper. b) Record which is stored , recorded, or copied in optical or magnetic media  produced by computer c) Both A & B d) Neither A nor B

Last Answer : c) Both A & B

Description : In which memory data is temporarily stored while working on computer ?

Last Answer : Data is temporarily stored in RAM (Random Access Memory) while working on the computer .

Description : What is most used in Data Transfer of Real Time Application ?

Last Answer : Isochronous is more used in Data Transfer of Real Time Application .

Description : . From what should the digital data must be protected ? a. Copied b. Deleted c. Modified d. Destroyed

Last Answer : c. Modified

Description : What Happens When Information is Added , Processed and Stored ?

Last Answer : Information technology is associated with the distribution , processing and storage of information.

Description : What is meant by version of application package program ?

Last Answer : Package software manufacturers regularly launch new versions of package software in the market by checking the needs of the buyers. This is called a version of the application package program. ... program are released to survive the competition , meet customer demand, and succeed commercially.

Description : What are the types of application architecture ?

Last Answer : There are basically three types of application architecture. Namely: 1. Client Server Architecture , II. Peer-to-peer ( P2P) architecture and 3. Hybrid Architecture (a combination of the previous two)

Description : What is application layer ?

Last Answer : As we all know , network internet model has five layers: physical layer , data link layer , network layer, transfer and application layer. The OSI model has seven layers and we are not going that way. ... does not run on layers on these devices, it runs on the network or the layers below it.

Description : What is an application server ?

Last Answer : Application servers are usually used so that network users can access various applications from the server. This is called application server. Each machine on the network has multiple problems installing and managing the same application differently.

Description : What is application software ?

Last Answer : Application software is the application software that is performed according to the needs of the computer user and specific tasks. It is just called application or app . Computer applications are ... accounting software , office software , graphics software , various media player video and audio.

Description : Are there any passages from books you have copied out because the writing is so exquisite?

Last Answer : I adore this passage and could read it again and again. The rising of the spring stirred a serious, mystical excitement in him and made him forgetful of her. He would pick up eggshells, a ... that she loved him best, as a soul all unaccompanied, like her own. Housekeeping by Marilynne Robinson

Description : Can a ctrl-cut/copied text be reverted to a previous unpasted text ?

Last Answer : If you’ve not saved the file since cut/paste, simply “undo” with Control z.

Description : Is there a way to know if an original DVD has been copied?

Last Answer : No.

Description : Are you aware that digital company machines have records of everything copied on them?

Last Answer : Do you have a source of this information?

Description : Playing DVDs I have burned/copied on my pc on any other DVD player?

Last Answer : Check your region settings.

Description : Do you think Coldplay's song Viva la Vida copied Creaky Boards song The Songs I Didn't Write?

Last Answer : I think they pretty much admitted that that claim was false. It was a publicity stunt.

Description : How do I get the things I bought on iTunes get copied to my pc desktop file?

Last Answer : Hmmmm… I’ve never bought anything off iTunes Store, but I’m familiar enough with the app that I think I can help. Just to clarify, you’re using a Mac and would like to copy the file to another computer? Or would you just like to duplicate it on the same computer?

Description : I just copied all of my purchased iTunes music into the trash. How do I put it back into iTunes without going through the trash one by one?

Last Answer : Can’t you just right-click then “restore all items?”

Description : How to find the clipboard? The second-to-last item copied on the clipboard while using Firefox on a Mac?

Last Answer : I have a great app for it: shadowClipboard. The only problem is that it records the clipboard only if it’s running. I’m sorry to say that your clipboard-cutting is lost, because it instantly overrides your current clipping.

Description : Can smart cards be forged, copied, or altered?

Last Answer : answer:They are probably better than much of what is around now, but no doubt once they are in use, sophisticated thieves will begint rying to break them. Basically, their claims to security ... privacy in a single sign-on system that uses fingerprint biometrics as the single sign-on credential.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : You want to send a valuable object to a friend. You have a box which is more than large enough to contain the object. You have several locks with keys. The box has a locking ring which is more than ... do it? Note that you cannot send a key in an unlocked box, since it might be copied. -Riddles

Last Answer : Attach a lock to the ring. Send it to her. She attaches her own lock and sends it back. You remove your lock and send it back to her. She removes her lock.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : When a folder is copied to another place, sub_folders in the folder also get copied. -Technology

Last Answer : TrueWhen a folder is copied to another place, all its sub-folders alongwith their contents also get copied.

Description : In a spreadsheet software, the formula =A1 +$2 was entered in cell A3 and then copied into cell B3. What is the formula copied into B3? -Technology

Last Answer : Need Answer

Description : Can adding a copyright logo to my photos protect them from getting copied?

Last Answer : Today many people will add a copyright logo to the photos they sell online or use in their blog or website. The Watermark is used to protect your images. However, this isn't always the way it ... and use a service that can help you find the person who has borrowed this without your permission.

Description : cDNA probes are copied from the messenger RNA molecules with the help of

Last Answer : cDNA probes are copied from the messenger RNA molecules with the help of A. restriction ... C. DNA olyermase D. adenosine deaminase deficiency

Description : When is DNA copied in the mitotic phase?

Last Answer : Need answer

Description : What European movement copied the Romans much as the Romans copied the Greeks?

Last Answer : Feel Free to Answer

Description : In this case scientists have copied a type of naturally occurring genetic mutation called?

Last Answer : Feel Free to Answer

Description : What happens to the original DNA strand once the mRNA is completely copied?

Last Answer : Feel Free to Answer

Description : Why is the Torah hand copied?

Last Answer : The Torah is available in printed form in any Bible (the books of Genesis through Deuteronomy), not to mention the copies of the Chumash typically found in synagogue sanctuaries and Jewish homes ... backed by numereous passages scattered through the Talmud and codified in later codes of Jewish law.

Description : If you copied b4 to c6 what would be the resulting cell refernce in c6?

Last Answer : Need answer

Description : Why is the Torah hand copied?

Last Answer : The Torah is available in printed form in any Bible (the books of Genesis through Deuteronomy), not to mention the copies of the Chumash typically found in synagogue sanctuaries and Jewish homes ... backed by numereous passages scattered through the Talmud and codified in later codes of Jewish law.

Description : Will they accept my copied coupon?

Last Answer : If the coupon code featured on the coupon is unique to you, then you will not be able to copy your coupon for your friend. Check the coupon for details and have your friend visit the website for her own coupon.

Description : Mark the correct option relating to fee for obtain information under RTI act a) Rs 2/- per each page (A4/A3 size paper) created or copied b) Actual charge or cost price of a copy in large size paper ... records no fee for the first hour and a fee Rs5/- for each  subsequent hour  e) All the above

Last Answer : e) All the above

Description : The Superintendent should examine the ________ to see that all _____concerning the set are neatly and correctly copied in the book, that the book contains no. B. order which does not concern the set, that B ... clerk's, sorters c) guidance book, B. orders, record clerk's, sorters d) None of these

Last Answer : c) guidance book, B. orders, record clerk’s, sorters

Description : In the context of strategic management resources can be defined as: a) The knowledge and skills within the organization b) Something that an organization owns or controls that cannot be copied c) ... , controls or has access to on a semipermanent basis d) The physical assets of the organization

Last Answer : Something that an organization owns, controls or has access to on a semipermanent basis

Description : In the context of strategic management resources can be defined as: A. The knowledge and skills within the organization B. Something that an organization owns or controls that cannot be copied C. ... , controls or has access to on a semipermanent basis D. The physical assets of the organization

Last Answer : The physical assets of the organization

Description : What is the switch that is used to make sure that the COPY command copied files correctly 1) /A 2) /C 3) /S 4) /V

Last Answer : 4) /V

Description : What is the switch that is used to make sure that the COPY command copied files correctly 1 /A 2 /C 3 /S 4 /V

Last Answer : 4 /V

Description : Essex Office Products has decided to use a particular competitive tool that it feels will have a major impact. Its consultant, Dr. Bell, contends that this particular approach is the one most ... in question is: A)price B)market segmentation C)distribution D)promotion E)product innovation

Last Answer : A)price

Description : The average height of 60 girls was calculated to be 300 cm. It was detected later that one value of 330 cm was wrongly copied as 270 cm for the computation of the mean. Find the correct mean. A) 301cm B) 300.5cm C) 307cm D) 311cm

Last Answer : A) Calculated average height of 60 girls = 300cm. Incorrect sum of the heights of 60 girls = (300 60)cm = 18000 cm. Correct sum of the heights of 60 girls = (incorrect sum) - (wrongly copied item) ... 330) cm = 18060cm. Correct mean = correct sum/number of girls = (18060/60) cm = 301 cm.

Description : What is Wireless Data Communication ?

Last Answer : Wireless data communication is a common component of mobile computing.

Description : What is the data used in Bioinformatics ? Explain ?

Last Answer : Bioinformatics is a technique used to solve biological problems using applied mathematics , information science , statistics , computers , science , artificial intelligence , chemistry and biochemistry. Basically ... computers , which are used for the discovery and development of new genetic drugs.

Description : Why Fiber Optic Cable is Safe in Data Transport ?

Last Answer : Optical fiber cable is safe for data transfer. It is a coating made of plastic or other materials , which protects the fiber from moisture , abrasion , sprains and other natural disasters. With ... Due to the high electrical resistance, this cable can be used with high voltage electrical equipment.

Description : What do you mean by data warehouse ?

Last Answer : Data Warehouse is a huge database that stores the data needed to analyze historical and current transactions. A data warehouse is a logical collection of data and information that is collected from various operational databases.

Description : Explain when the primary key fields of two data tables need to be the same. ?

Last Answer : Due to the following condition of the relation, the primary key fields of the data tables of the two databases need to be the same to create the relation. 1. The common field must be the primary key ... field size , format etc. should be the same and two tables should be open at the same time.

Description : Memo ”Why is data type used ?

Last Answer : Data type ( Memo) is used for descriptive writing or description . 65536 characters (letters , numbers , symbols , dates, etc.) can be written for this field . Usually the do type memo of that field is used for writing comments.