Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Windows Tricks

Tip of the Week: 5 Windows Tricks

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Data Backup Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Chrome Gadgets Virtualization Social Media Managed Service Managed IT Services Microsoft Office Automation Computers Cybercrime Operating System Facebook Artificial Intelligence Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Remote Information Spam Covid-19 Managed Service Provider Office 365 Telephone Systems Alert Information Technology Employer-Employee Relationship Recovery Bandwidth Router BDR Social Engineering Mobility Mobile Computing Money Human Resources Encryption Application Applications Data Breach Remote Monitoring Law Enforcement Big Data App History Password Apps Data Storage Paperless Office Patch Management Remote Computing Mobile Office Government Private Cloud How To Office Tips Managed IT Training Blockchain VPN WiFi Settings Vulnerability IT solutions Entertainment Website Windows 7 Word Budget Two-factor Authentication Google Drive Infrastructure Voice over Internet Protocol Servers Mouse HaaS Avoiding Downtime Data Security Wireless Bring Your Own Device Flexibility Data Management Gmail Work/Life Balance Marketing Conferencing Staff Software as a Service Telephone System Machine Learning Firewall Scam End of Support Connectivity Remote Work Education Physical Security USB Virtual Reality Safety Apple Vendor HIPAA Sports Redundancy Vendor Management Social Managed Services Display Keyboard User Error Meetings Employee/Employer Relationship Data Protection RMM Risk Management Hacker Save Time The Internet of Things Lithium-ion battery Cleaning Customer Service Environment Procurement Net Neutrality Printer Workplace Strategy Fax Server Battery Business Intelligence Bluetooth Help Desk Update Shadow IT Printing Audit Worker Legal IT Management SaaS Google Docs Internet Exlporer Botnet Identity Theft IT Plan Managed Services Provider IT Consultant Network Congestion PDF Database eWaste Unsupported Software Humor Proactive IT Augmented Reality Remote Workers Charger Fraud Best Practice Processor Compliance YouTube Remote Worker Black Market OneNote Wearable Technology Computer Care Retail Hard Drives Cryptocurrency Hard Drive Current Events Instant Messaging Telephony Excel Samsung Robot Document Management Computing Comparison Biometrics Solid State Drive Wireless Technology Downtime Value Virtual Desktop How to CES Spam Blocking Electronic Medical Records Virus Data storage DDoS Content Management Automobile Unified Threat Management Business Technology Access Control Digital Signage SharePoint Hiring/Firing Computer Accessories Computing Infrastructure Virtual Assistant Going Green Authentication Reputation AI Streaming Media IT Infrastructure Assessment Cables Bing Content FinTech Tech Support Windows Server 2008 Laptop Tools Project Management Social Network Nanotechnology Antivirus Telecommuting Techology Windows 8 Customers Investment Television Cortana Digital Signature IT service Audiobook Employees Employee/Employer Relationships Touchpad Warranty ISP Printer Server Windows 365 Tablet Video Conferencing HVAC ROI Public Computer Google Apps Analysis Shortcuts Domains Transportation Politics Advertising Sales Regulations Bitcoin Administrator Personal Computer Fan Devices Cryptomining Rootkit Point of Sale Maintenance Supply Chain Management Notifications Enterprise Content Management IaaS Workers Accountants Benefits Bloatware Monitoring MSP Batteries Microchip Digitize FENG Thought Leadership Credit Cards Windows 8.1 Tablets Relocation Password Management Windows Server 2008 R2 IBM Password Manager Smart Technology Multi-Factor Security Entrepreneur Customer relationships Flash Search Engine IT Assessment Twitter Manufacturing Video Games Email Best Practices Shortcut Worker Commute Software Tips NIST Supercomputer Business Mangement Emails Smart Tech Security Cameras Consultant Trending Experience Cost Management Computer Tips Sync Managed IT Service Virtual CIO OneDrive Addiction Biometric Security Amazon Analytics Social Networking Scalability Business Owner Peripheral Recycling Using Data Netflix Practices Best Available Two Factor Authentication Digital Security Cameras NarrowBand Wiring Copiers Root Cause Analysis Cache 5G WIndows 7 Running Cable Amazon Web Services Search Music Memory iPhone Quick Tip HBO Safe Mode Knowledge Criminal Hosted Computing Smartwatch Ergonomics Skype GDPR Development Data loss Wireless Internet OLED Online Shopping Troubleshooting Files PCI DSS Outlook File Sharing Virtual Machine Leadership Start Menu Camera Fiber Optics Inventory Employee Specifications 2FA Chromecast Windows Media Player Science Messaging Screen Mirroring Wire Cabling User Loyalty Evernote PowerPoint Books Travel Colocation Policy Uninterrupted Power Supply Frequently Asked Questions Hypervisor Mobile Printers Trend Micro Windows 10s Millennials Dark mode Monitor SMS Cast Smart Office Default App Managing Stress Distributed Denial of Service Wireless Charging Customer Relationship Management webinar Emergency Analyitcs Procedure Tip of the week Saving Time Professional Services Virtual Private Network Shopping Public Cloud Google Search Employer Employee Relationship Workforce Cameras Programming dark theme

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code