Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take a Screenshot in Windows 10

Tip of the Week: Take a Screenshot in Windows 10

There is one key on the keyboard that might seem a little odd: PrtSc. It’s not immediately obvious what this key does or why you would want to use it, but we assure you that it is an extremely helpful keyboard shortcut once you understand how it works and why you might want to try it out. In reality, the PrtSc key is important for taking screenshots on your Windows device.

Windows has a lot of keyboard shortcuts, but PrtSc is perhaps one of the easiest to carry out. When you hit the PrtSc key, Windows will take a screenshot of your computer’s monitor, allowing you to save it as an image.

There are many practical reasons for taking screenshots, many of which you might not have considered. Let’s go over your options for taking screenshots on your Windows device.

Why Take Screenshots?

Screenshots are incredibly helpful for a variety of reasons, one of which is to help IT support determine what the root cause of your technology troubles is. Basically, it lets them see what you see on the screen so they can check off boxes for more common fixes before diving into more technical issues. Screenshots are also helpful for documentation purposes, allowing you to put together guides for workflows and processes for more visual learners.

The PrtSc Key

When you hit the PrtSc key, you might notice that there are no pop-ups or anything that appears on-screen to show that you have taken a screenshot. Basically, the PrtSc key captures an image of your desktop screen and copies it to the clipboard as an image. You can then paste it like you would if it were copied or cut text. The problem with this is that it takes a screenshot of the whole screen, not just one part of it, so for more focused screenshots, you have to get a little more creative.

Snip & Sketch

This solution is built right into Windows 10 and allows you to snip specific parts of your screen for a screenshot. To use Snip & Sketch, use the keyboard shortcut Shift + Windows Key + S. There are some options here: Rectangular Snip, Freeform Snip, Window Snip, and Fullscreen Snip. Pick whichever you think best suits your needs. Your selection will then be saved to the clipboard in the same way as PrtSc, allowing you to paste it into an application or edit it in the Snip & Sketch tool.

Third-Party Services, Applications, and Extensions

There are some third-party tools and applications that you can use to take screenshots that let you capture specific parts of your screen in much the same way Snip & Sketch allows. These other solutions may be perfectly effective for taking screenshots, but you should clear any of them with IT first just to make sure that the solution is one that is allowed on your network. Plus, you might already have better tools available to you, so it never hurts to confirm with IT before going all-in on a screenshot tool; and, of course, you have us to fall back on as well!

So, how are you going to use screenshots to take your business to the next level? Let us know in the comments, and be sure to subscribe for more great tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Data Recovery Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Gadgets Social Media Chrome Tech Term Managed IT Services Automation Microsoft Office Managed Service Computers Artificial Intelligence Facebook Operating System Cybercrime BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health Remote Spam Office 365 Covid-19 Telephone Systems Alert Managed Service Provider Information Information Technology Router BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Applications Mobile Computing Remote Monitoring Application Law Enforcement App History Big Data Password Data Breach Money Encryption Human Resources Remote Computing How To Government Mobile Office Private Cloud Blockchain Data Storage Patch Management Paperless Office Managed IT Office Tips Training Apps VPN Two-factor Authentication Marketing Google Drive WiFi Data Security IT solutions Entertainment Mouse HaaS Website Budget Avoiding Downtime Vulnerability Wireless Windows 7 Bring Your Own Device Data Management Word Work/Life Balance Gmail Servers Infrastructure Settings Voice over Internet Protocol Flexibility Safety Virtual Reality HIPAA Apple Sports Redundancy Keyboard Data Protection Social USB User Error Meetings Vendor Managed Services Display Risk Management Save Time Conferencing Hacker Staff Software as a Service Telephone System Scam The Internet of Things Machine Learning Employee/Employer Relationship Cleaning Lithium-ion battery Connectivity RMM Remote Work Vendor Management End of Support Firewall Physical Security Education SaaS Fraud Compliance Computer Care OneNote Current Events PDF Remote Worker Telephony Procurement Printer Samsung Workplace Strategy Cryptocurrency Net Neutrality Network Congestion Bluetooth eWaste Proactive IT Help Desk Value Best Practice Printing Comparison YouTube Spam Blocking Electronic Medical Records Black Market CES IT Consultant Managed Services Provider Wearable Technology Hard Drives Retail Hiring/Firing Database Instant Messaging Business Technology Document Management Content Management Access Control Humor Solid State Drive Robot Wireless Technology Excel Remote Workers How to Downtime Biometrics Virtual Assistant Authentication Processor Virtual Desktop Data storage Business Intelligence Automobile Hard Drive DDoS Audit Worker SharePoint Computing Infrastructure Update IT Management Going Green Botnet Computing Google Docs IT Plan Identity Theft Customer Service Environment Battery Virus Shadow IT Unsupported Software Legal Fax Server Unified Threat Management Digital Signage Computer Accessories Charger Internet Exlporer Augmented Reality Search Engine Procedure Sync Twitter Saving Time Emails Tablet Cameras Notifications dark theme NIST Shopping Business Mangement Google Search Domains Smart Tech IT Infrastructure Trending AI FinTech Addiction IaaS Netflix Amazon Bing Maintenance Two Factor Authentication Relocation Bloatware Social Network Root Cause Analysis Recycling HBO Practices Investment Knowledge Music Wiring Employees Skype Cache Employee/Employer Relationships Video Games Amazon Web Services Tablets Printer Server Entrepreneur Windows 365 Safe Mode Data loss Worker Commute Criminal ISP Outlook Experience Hosted Computing ROI Leadership Troubleshooting GDPR Video Conferencing Sales Start Menu Wireless Internet Bitcoin Scalability Online Shopping Shortcuts Shortcut Loyalty Cost Management Point of Sale File Sharing Personal Screen Mirroring Business Owner Cryptomining Supply Chain Management Frequently Asked Questions Inventory Specifications Social Networking Books NarrowBand Camera Monitoring Mobile Wire Batteries Windows 10s Search Evernote iPhone Travel Windows 8.1 Digitize Cast Printers Tip of the week Windows Server 2008 R2 Running Cable webinar Millennials Emergency Memory Customer relationships Professional Services Smart Office Public Cloud Wireless Charging Employer Employee Relationship Manufacturing Assessment Files Email Best Practices IT Assessment Virtual Private Network Windows Server 2008 Workforce Chromecast Computer Tips Tools Managed IT Service Consultant Cables Security Cameras Biometric Security Analytics Television Colocation Uninterrupted Power Supply Virtual CIO OneDrive Project Management Peripheral Nanotechnology Telecommuting Science Digital Security Cameras Using Data Best Available Cortana Monitor Digital Signature 5G Public Computer Copiers WIndows 7 Warranty Quick Tip Regulations Distributed Denial of Service Customer Relationship Management Transportation Analyitcs Streaming Media Ergonomics HVAC Computer Fan Google Apps Smartwatch Rootkit Reputation Analysis OLED Programming Tech Support Development Content Administrator PCI DSS Devices Virtual Machine Workers Techology Benefits Laptop 2FA Enterprise Content Management Fiber Optics FENG Employee Customers Audiobook Accountants Cabling Antivirus PowerPoint IBM Windows Media Player MSP Messaging User Microchip Policy Flash Thought Leadership Hypervisor Credit Cards Smart Technology Touchpad Windows 8 Dark mode Password Management Trend Micro Password Manager IT service Managing Stress Software Tips Politics Default App Supercomputer Advertising Multi-Factor Security SMS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code