Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 10 Handy Windows 10 Keyboard Shortcuts

b2ap3_thumbnail_shortcuts_for_windows_10_400.jpgWith the launch of Windows 10, many users are upgrading and loving every second of it. As always, a new operating system comes with a learning curve, including getting to know the new features and keyboard shortcuts. To get the most out of Windows 10, you can try these ten great hotkey combinations to get through your workday with blazing speed.

[WinKey + S] Activates Cortana
[WinKey + C] Activates Cortana with Speech
Microsoft’s Cortana feature, which was once exclusive to Windows Phone users, is now built into Windows 10 by default. She acts as a personal voice assistant, much like Apple’s Siri. You can use these shortcuts to make more effective use of Cortana.

[WinKey + Ctrl + D] Creates a New Virtual Desktop
[WinKey + Ctrl + F4] Close Virtual Desktop
[WinKey + Ctrl + Left or Right] Switch Between Virtual Desktops
One of the neat new features Windows 10 offers is virtual desktops, which will most likely be used by enterprises to enhance productivity. You can easily use the above keystrokes to navigate through your current virtual desktops, plus open and close them on your local desktop.

[WinKey + Shift + Left or Right] Move Apps from One Monitor to Another
Workers generally use two monitors to get the most done, but if you’re working with several different applications, it can be a bother to continually resize the windows and move them about. To make this process much easier, use the above keystroke while you have a window selected.

[WinKey + K] Activates Connect Feature to Stream to Wireless Displays and Audio Devices
This keystroke is pretty self explanatory, and it will be used often by those who regularly access Connect.

[WinKey + R] Run a Command
Regardless of how many new features there are in Windows 10, the basics still apply. You’ll want to access the Run Command function. This keystroke makes it much easier to do so.

[WinKey + I] Opens Windows 10 Settings
As one of the most customizable operating systems Microsoft has created, Windows 10 offers plenty of great ways you can put the “personal” back in your PC. Use this keystroke to make navigating to your settings easier.

[WinKey + G] Activates the New Xbox Game Bar to Let You Record Games or Take Screenshots
All you gamers out there are going to love this keystroke.

For more ways you can get the most out of Windows 10, keep an eye out for more productivity and technology tips from Total Tech Care.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Windows Upgrade Managed IT Services Phishing Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Office Cloud Computing Data Recovery Passwords Windows 10 Chrome Tech Term Virtualization Social Media Gadgets Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Wi-Fi Networking IT Support Hacking Internet of Things BYOD Health Mobile Device Management Information Managed Service Provider Spam Remote Office 365 Telephone Systems Covid-19 Information Technology Alert Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Password Money Remote Monitoring Big Data Data Breach Encryption Applications App History Mobile Computing Law Enforcement Application Human Resources Remote Computing Data Storage Paperless Office Patch Management Apps Mobile Office Office Tips Training Government How To VPN Private Cloud Managed IT Blockchain Bring Your Own Device Data Management Vulnerability Work/Life Balance Mouse HaaS Windows 7 Word Infrastructure Voice over Internet Protocol Servers Google Drive Flexibility Wireless Marketing Data Security WiFi Avoiding Downtime IT solutions Gmail Entertainment Website Budget Settings Two-factor Authentication Apple Conferencing Telephone System Staff Software as a Service Cleaning Social Machine Learning Scam Connectivity Remote Work User Error End of Support Meetings Education Physical Security Vendor Management Safety HIPAA Risk Management Sports Redundancy Hacker Vendor Keyboard Managed Services Display Data Protection The Internet of Things Lithium-ion battery Employee/Employer Relationship USB Firewall RMM Save Time Virtual Reality Humor Digital Signage Computing Infrastructure Network Congestion Going Green Business Intelligence eWaste Update Audit Worker IT Management Battery Google Docs Procurement Botnet Net Neutrality Workplace Strategy Shadow IT Identity Theft IT Plan Legal Wearable Technology Help Desk Retail Hard Drives Printing Internet Exlporer Instant Messaging Robot Excel Unsupported Software Augmented Reality Virus Biometrics Charger PDF Fraud Virtual Desktop Unified Threat Management Managed Services Provider Remote Worker Compliance Computer Accessories Database OneNote Computer Care Proactive IT Cryptocurrency DDoS Current Events Best Practice Remote Workers Telephony Samsung SharePoint YouTube Black Market Processor Printer Comparison Bluetooth Value CES Customer Service Hard Drive Spam Blocking Document Management Electronic Medical Records Environment Wireless Technology Solid State Drive How to Business Technology Downtime Content Management Fax Server Hiring/Firing Access Control Computing IT Consultant Virtual Assistant SaaS Data storage Automobile Authentication Cables Messaging Cabling Assessment IaaS Monitor Maintenance Policy Hypervisor Windows Server 2008 Tools Project Management Nanotechnology Dark mode Telecommuting Bloatware Trend Micro Cortana SMS Default App Television Consultant Reputation Digital Signature Procedure Streaming Media Tablets Saving Time Shopping Google Search Content Warranty dark theme Analytics Tech Support Entrepreneur Laptop Google Apps AI IT Infrastructure Public Computer Techology HVAC Bing Best Available Transportation Customers Analysis Shortcut FinTech Regulations Social Network Computer Fan Audiobook Administrator WIndows 7 Rootkit Devices Cost Management Touchpad Social Networking Investment Enterprise Content Management Workers MSP Benefits Accountants Employees Employee/Employer Relationships ISP FENG Politics Microchip Advertising Thought Leadership Windows 365 Credit Cards Running Cable Password Manager Video Conferencing ROI IBM Password Management Shortcuts Smart Technology Sales Notifications Multi-Factor Security Memory Bitcoin Flash Personal Windows Media Player Cryptomining Search Engine User Twitter Point of Sale PowerPoint NIST Business Mangement Supply Chain Management Software Tips Supercomputer Emails Relocation Smart Tech Monitoring Trending Batteries Sync Amazon Digitize Managing Stress Addiction Windows 8.1 Recycling Science Windows Server 2008 R2 Video Games Netflix Worker Commute Wiring Two Factor Authentication Practices Customer relationships Cameras Amazon Web Services IT Assessment Manufacturing Root Cause Analysis Experience Cache Email Best Practices Safe Mode Distributed Denial of Service Music Criminal Customer Relationship Management HBO Knowledge Scalability Security Cameras Business Owner GDPR Hosted Computing Computer Tips Analyitcs Managed IT Service Skype Online Shopping Programming OneDrive Biometric Security Data loss Wireless Internet Virtual CIO NarrowBand Search File Sharing Troubleshooting Peripheral Outlook Leadership Start Menu Camera iPhone Inventory Digital Security Cameras Printer Server Specifications Using Data Evernote Copiers 5G Screen Mirroring Loyalty Wire Antivirus Books Quick Tip Travel Windows 8 Frequently Asked Questions Mobile Smartwatch Windows 10s Printers Files IT service Ergonomics Millennials Chromecast Wireless Charging Development OLED Cast Smart Office webinar Emergency PCI DSS Tablet Virtual Machine Tip of the week Professional Services Employee Public Cloud Virtual Private Network Employer Employee Relationship Colocation Domains 2FA Uninterrupted Power Supply Workforce Fiber Optics

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code