Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Fascinating History of the Cut, Copy, and Paste Shortcuts

The Fascinating History of the Cut, Copy, and Paste Shortcuts

Technology can do some incredible things, but there’s a reason why basic tools still remain popular even to this day. It’s because they cracked the code for productivity, and they are so easy that anyone can use them. For example, there’s the Cut, Copy, and Paste commands that can be used in literally any application out there.

Cut and Paste Are Remnants of the Traditional Editing Processes

Back in the day, manuscripts would be edited by physically cutting up pages and pasting them back together in a different order, hence the name.

This practice was popular up until the 1980s, only fading in response to the word processor. There used to be long scissors used specifically for this task, as they could cut through a whole page during the editing process. These days, computers are capable of doing so much more, as you can simply use the Cut and Paste processes for these purposes in a much easier and less manual way.

In fact, the Copy function further invalidates this practice, along with the Undo and Redo functions, relegating this physical activity to become a relic of the past.

Here’s a Quick Shortcut Reminder

It’s easy to forget keyboard shortcuts when they’re not used day-to-day, so we’ve put together a short list of these helpful strokes here:

  • Cut - Ctrl+X
  • Copy - Ctrl+C
  • Paste - Ctrl+V
  • Undo - Ctrl+Z

Just remember, technology has allowed you to make these tasks less manual and more streamlined. Imagine where else in your business you can do the same!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones AI Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Healthcare Operating System Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device 2FA Managed IT Services Big Data Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Free Resource Customer Service Project Management Display Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Monitoring Solutions Document Management Firewall Telephone Scam Windows 11 Data loss The Internet of Things Cooperation Excel Social Going Green Patch Management Remote Workers Save Money Settings Wireless Printing Content Filtering iPhone IT Management Customer Relationship Management YouTube Meetings VPN Vulnerabilities Data Privacy Cryptocurrency Modem Hacking User Tip Processor Images 101 Presentation Computer Repair Mobile Security Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Wireless Technology Smart Technology Outlook Machine Learning Employees Money Saving Time Humor Word Integration Managed IT Service Maintenance Downloads Antivirus Sports Mouse Holidays Licensing Safety Data Storage Entertainment Administration Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Telephone System Cost Management SQL Server Technology Care Alt Codes Content IBM Net Neutrality Wearable Technology Financial Data Downtime Unified Threat Management Motherboard History Comparison Business Communications Health IT Unified Threat Management Directions Smartwatch Hosted Solution Assessment IT Permissions Scams Azure Hybrid Work Typing Procurement Telework Cyber security Network Congestion Specifications Tech Human Resources Google Drive User Error Microchip CES Internet Exlporer Competition Communitications Knowledge Fraud Cables Username Supply Chain Management FinTech Point of Sale 5G Black Friday Term Google Apps Google Docs Unified Communications Database IT Assessment Experience IT Maintenance Value Business Intelligence Bitcoin Network Management Flexibility Running Cable Tech Support IT Technicians User Organization Cookies Monitors Cyber Monday Shortcuts Google Wallet Proxy Server Digital Security Cameras Tactics Smart Devices Hotspot Ransmoware Memory Vendors Windows 8 IP Address Remote Working Laptop Websites Mirgation Nanotechnology Data Breach Google Play Be Proactive Drones SharePoint Videos Addiction Electronic Health Records Electronic Medical Records Language Workforce Recovery Wasting Time Threats Management Halloween Chatbots Screen Reader Hard Drives Trend Micro Writing Distributed Denial of Service Security Cameras Workplace Strategies Lenovo Service Level Agreement Domains Software as a Service Virtual Reality Computing Infrastructure Meta Managing Costs Amazon Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration eCommerce Fun SSID Superfish Bookmark Deep Learning Download Public Speaking Surveillance Twitter Alerts Virtual Assistant Outsource IT Virtual Machine Environment Media Lithium-ion battery Error Browsers Reviews Education Connectivity Social Engineering Break Fix Entrepreneur Medical IT Upload Development Remote Computing Transportation Small Businesses Hypervisor Displays Multi-Factor Security Mobile Computing Social Network Shopping Tablet IoT Undo Optimization Search Dark Web PowerPoint Best Practice Trends Alert Employer/Employee Relationships Outsourcing PCI DSS Buisness File Sharing Regulations Dark Data Google Calendar Navigation Managed IT Customer Resource management Legal Data Analysis Gig Economy IT solutions Star Wars How To Microsoft Excel Workplace Teamwork Hiring/Firing Business Growth Gamification Internet Service Provider Notifications Staff Regulations Compliance Travel Social Networking Application Legislation Evernote Paperless Techology Fileless Malware Google Maps Memes Cortana Co-managed IT

Blog Archive