Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Better Way to Take a Screenshot on Windows

Tip of the Week: The Better Way to Take a Screenshot on Windows

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Data Recovery Server Save Money Windows 10 Passwords Tech Term Virtualization Gadgets Saving Money Holiday Social Media Chrome Managed IT Services Automation Managed Service Microsoft Office Computers Artificial Intelligence Facebook Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Spam Office 365 Alert Telephone Systems Remote Information Technology Covid-19 Managed Service Provider Information BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router Law Enforcement Remote Monitoring Mobile Computing App Application History Password Money Encryption Applications Human Resources Big Data Data Breach Mobile Office Private Cloud How To Managed IT Office Tips Training Apps Data Storage Blockchain VPN Patch Management Paperless Office Remote Computing Government HaaS Avoiding Downtime Flexibility Data Security Marketing WiFi IT solutions Entertainment Website Budget Bring Your Own Device Wireless Data Management Work/Life Balance Gmail Vulnerability Settings Windows 7 Word Google Drive Two-factor Authentication Servers Infrastructure Voice over Internet Protocol Mouse User Error Meetings Data Protection Save Time Risk Management Hacker USB Cleaning The Internet of Things Lithium-ion battery Vendor Conferencing Managed Services End of Support Staff Software as a Service Display Telephone System Education Physical Security Scam Firewall Machine Learning Safety Connectivity Remote Work Sports HIPAA Virtual Reality Employee/Employer Relationship Redundancy Apple Vendor Management Keyboard RMM Social YouTube Charger Black Market Unified Threat Management Augmented Reality Fraud Computer Accessories Compliance Computer Care OneNote Digital Signage Current Events Remote Worker Wearable Technology Document Management Telephony Hard Drives Wireless Technology Samsung Cryptocurrency Retail Solid State Drive How to Instant Messaging Downtime Robot Printer Excel Value Bluetooth Procurement Biometrics Comparison Net Neutrality Data storage Workplace Strategy Automobile Virtual Desktop Spam Blocking Electronic Medical Records Help Desk CES Printing Hiring/Firing DDoS Computing Infrastructure Going Green Business Technology IT Consultant Content Management SharePoint Access Control Managed Services Provider Humor Virtual Assistant Authentication Battery Database Shadow IT Customer Service Remote Workers Legal Business Intelligence Environment Internet Exlporer Worker Fax Server Processor Audit IT Management Update SaaS Botnet Hard Drive PDF IT Plan Google Docs Identity Theft Proactive IT Computing Unsupported Software Network Congestion eWaste Virus Best Practice Windows Media Player Password Management PCI DSS Experience User Password Manager Virtual Machine PowerPoint Tablets Fiber Optics Scalability Software Tips Entrepreneur Multi-Factor Security Employee Supercomputer 2FA Search Engine Twitter Messaging Business Owner Sync Cabling Emails NarrowBand NIST Policy Managing Stress Shortcut Business Mangement Hypervisor Smart Tech Trend Micro Search Cost Management Trending Dark mode Addiction SMS Social Networking Amazon Default App iPhone Netflix Cameras Two Factor Authentication Procedure Recycling Saving Time Root Cause Analysis Practices Shopping HBO Google Search Knowledge Music Wiring dark theme Running Cable Cache AI Skype Amazon Web Services IT Infrastructure Files Memory Bing Chromecast Safe Mode FinTech Criminal Data loss Hosted Computing Social Network Outlook Leadership Troubleshooting GDPR Wireless Internet Start Menu Online Shopping Investment Colocation Printer Server Uninterrupted Power Supply Screen Mirroring Loyalty File Sharing Employees Employee/Employer Relationships Inventory Frequently Asked Questions Specifications ISP Monitor Books Camera Windows 365 Wire Video Conferencing Mobile Evernote ROI Windows 10s Science Cast Travel Shortcuts Sales Bitcoin Personal Tip of the week Millennials Cryptomining Reputation webinar Streaming Media Emergency Printers Point of Sale Tech Support Employer Employee Relationship Distributed Denial of Service Smart Office Supply Chain Management Content Professional Services Customer Relationship Management Wireless Charging Public Cloud Techology Analyitcs Laptop Assessment Monitoring Batteries Virtual Private Network Windows 8.1 Digitize Windows Server 2008 Programming Workforce Customers Audiobook Tools Cables Windows Server 2008 R2 Touchpad Television Customer relationships Project Management Email Best Practices Antivirus Nanotechnology IT Assessment Consultant Telecommuting Manufacturing Politics Cortana Advertising Analytics Windows 8 Digital Signature Managed IT Service Security Cameras Public Computer Computer Tips IT service Warranty Virtual CIO OneDrive Regulations Best Available Biometric Security Notifications Transportation Rootkit HVAC Peripheral WIndows 7 Google Apps Computer Fan Tablet Analysis Using Data Digital Security Cameras Domains Administrator Devices Copiers 5G Relocation Workers Benefits IaaS Enterprise Content Management Quick Tip Maintenance FENG Accountants Video Games Bloatware Smartwatch IBM MSP Ergonomics Microchip Thought Leadership Development Worker Commute Flash Credit Cards OLED Smart Technology

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code