Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Fascinating History of the Cut, Copy, and Paste Shortcuts

The Fascinating History of the Cut, Copy, and Paste Shortcuts

Technology can do some incredible things, but there’s a reason why basic tools still remain popular even to this day. It’s because they cracked the code for productivity, and they are so easy that anyone can use them. For example, there’s the Cut, Copy, and Paste commands that can be used in literally any application out there.

Cut and Paste Are Remnants of the Traditional Editing Processes

Back in the day, manuscripts would be edited by physically cutting up pages and pasting them back together in a different order, hence the name.

This practice was popular up until the 1980s, only fading in response to the word processor. There used to be long scissors used specifically for this task, as they could cut through a whole page during the editing process. These days, computers are capable of doing so much more, as you can simply use the Cut and Paste processes for these purposes in a much easier and less manual way.

In fact, the Copy function further invalidates this practice, along with the Undo and Redo functions, relegating this physical activity to become a relic of the past.

Here’s a Quick Shortcut Reminder

It’s easy to forget keyboard shortcuts when they’re not used day-to-day, so we’ve put together a short list of these helpful strokes here:

  • Cut - Ctrl+X
  • Copy - Ctrl+C
  • Paste - Ctrl+V
  • Undo - Ctrl+Z

Just remember, technology has allowed you to make these tasks less manual and more streamlined. Imagine where else in your business you can do the same!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Networking Apple How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Big Data Operating System Router Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Cooperation Free Resource The Internet of Things Project Management Windows 7 Social Patch Management Going Green Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Wireless Printing Content Filtering Customer Relationship Management IT Management VPN Employees Meetings YouTube Integration Cryptocurrency User Tip Modem Hacking Presentation Processor Computer Repair Mobile Security Holidays Virtual Desktop LiFi Wireless Technology Data storage Data Storage Smart Technology Supply Chain Video Conferencing Outlook Machine Learning Managed Services Provider Saving Time Virtual Machines Money Professional Services Word Humor Managed IT Service Maintenance Antivirus Downloads Sports Mouse iPhone Licensing Safety Entertainment Vulnerabilities Administration Alert Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Buisness Data Analysis Star Wars IT Assessment Legal How To Microsoft Excel IT Maintenance IT solutions Notifications Staff Value Business Intelligence Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Application Cortana Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Alt Codes IBM Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Downtime Hosted Solution Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Typing Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Competition Knowledge User Error Microchip Internet Exlporer Software as a Service Google Drive Fraud Meta Managing Costs Amazon Username 5G Point of Sale eCommerce Black Friday SSID Unified Communications Experience Database Surveillance Google Docs Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Bitcoin Media Running Cable User Network Management Proxy Server Reviews Cookies Google Wallet Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Windows 8 IP Address Laptop Shopping Nanotechnology Optimization Drones PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Halloween Recovery Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Hard Drives Domains Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Hacks Evernote Paperless Scary Stories Server Management Regulations Compliance Fun Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Refrigeration Deep Learning Public Speaking Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History Business Communications Lithium-ion battery Entrepreneur Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Education Remote Computing Azure Hybrid Work Upload Procurement Social Network Telework Cyber security Mobile Computing Multi-Factor Security Tech Human Resources Undo Search CES Tablet IoT Communitications Dark Web Cables

Blog Archive