Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Better Way to Take a Screenshot on Windows

Tip of the Week: The Better Way to Take a Screenshot on Windows

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Saving Money Holiday Tech Term Gadgets Chrome Virtualization Social Media Managed Service Managed IT Services Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Facebook Computers BYOD Health Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Spam Managed Service Provider Office 365 Alert Remote Telephone Systems Information Technology Covid-19 Information Router Bandwidth BDR Social Engineering Mobility Recovery Employer-Employee Relationship Application Human Resources Law Enforcement Remote Monitoring Big Data Data Breach App History Password Money Mobile Computing Encryption Applications Remote Computing Government Data Storage Patch Management Mobile Office Private Cloud Managed IT Office Tips Training Apps Blockchain Paperless Office VPN How To Two-factor Authentication Infrastructure Voice over Internet Protocol Avoiding Downtime Mouse HaaS Vulnerability Windows 7 Word Servers Bring Your Own Device Data Management Work/Life Balance Wireless Flexibility Data Security Marketing WiFi Gmail IT solutions Settings Entertainment Website Google Drive Budget USB HIPAA Sports Redundancy Employee/Employer Relationship Keyboard Virtual Reality RMM Apple Social Conferencing User Error Scam Meetings Data Protection Save Time Vendor Management Risk Management Hacker Cleaning The Internet of Things Lithium-ion battery Vendor Managed Services End of Support Telephone System Staff Software as a Service Display Physical Security Education Machine Learning Safety Remote Work Firewall Connectivity PDF Hard Drive Google Docs Hiring/Firing Identity Theft SaaS IT Consultant Proactive IT Computing Best Practice Network Congestion Humor YouTube eWaste Augmented Reality Black Market Fraud Business Intelligence Remote Worker Digital Signage Worker Document Management Audit IT Management Cryptocurrency Solid State Drive Wireless Technology Wearable Technology How to Downtime Hard Drives Botnet Retail IT Plan Instant Messaging Procurement Data storage Comparison Net Neutrality Workplace Strategy Robot Excel Automobile Unsupported Software Biometrics CES Help Desk Virtual Desktop Printing Virus Computing Infrastructure Charger Business Technology Content Management Unified Threat Management Going Green Computer Accessories Compliance DDoS Access Control OneNote Computer Care Managed Services Provider SharePoint Virtual Assistant Current Events Database Telephony Battery Authentication Samsung Shadow IT Legal Remote Workers Printer Customer Service Bluetooth Environment Value Processor Internet Exlporer Update Electronic Medical Records Fax Server Spam Blocking IT service Screen Mirroring HVAC Peripheral Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Analysis Using Data Books Tablet Relocation 5G Mobile Administrator Windows 10s Devices Copiers Domains Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics Video Games webinar Accountants Emergency Smartwatch Employer Employee Relationship Credit Cards OLED IaaS Professional Services Microchip Maintenance Worker Commute Public Cloud Thought Leadership Development Experience Password Management PCI DSS Bloatware Assessment Password Manager Virtual Machine Windows Server 2008 2FA Scalability Fiber Optics Multi-Factor Security Employee Tablets Cabling Tools Search Engine Business Owner Twitter Messaging NIST Policy Entrepreneur Television Business Mangement Hypervisor NarrowBand Dark mode Consultant Search Smart Tech Trend Micro Trending Analytics iPhone Amazon Default App Shortcut Addiction SMS Procedure Cost Management Public Computer Recycling Saving Time Regulations Wiring dark theme Social Networking Best Available Practices Shopping Transportation Google Search Computer Fan Cache AI Files Rootkit Amazon Web Services IT Infrastructure WIndows 7 Safe Mode FinTech Criminal Chromecast Bing Benefits Running Cable GDPR Workers Hosted Computing Social Network FENG Wireless Internet Memory Colocation Online Shopping Investment Uninterrupted Power Supply File Sharing Employees IBM Employee/Employer Relationships Monitor Smart Technology Specifications ISP Flash Camera Windows 365 Inventory User Wire Video Conferencing PowerPoint Evernote ROI Windows Media Player Software Tips Sales Supercomputer Bitcoin Travel Shortcuts Reputation Millennials Cryptomining Streaming Media Sync Printers Point of Sale Emails Personal Science Managing Stress Content Smart Office Supply Chain Management Wireless Charging Tech Support Monitoring Techology Batteries Laptop Cameras Customers Two Factor Authentication Workforce Distributed Denial of Service Virtual Private Network Windows 8.1 Customer Relationship Management Netflix Digitize Audiobook Root Cause Analysis Analyitcs Cables Windows Server 2008 R2 HBO Customer relationships Programming Knowledge Touchpad Music Telecommuting Manufacturing Skype Project Management Email Best Practices Nanotechnology IT Assessment Politics Data loss Advertising Cortana Antivirus Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Windows 8 Printer Server Biometric Security Notifications Start Menu Warranty Virtual CIO OneDrive

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code