Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Better Way to Take a Screenshot on Windows

Tip of the Week: The Better Way to Take a Screenshot on Windows

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Social Media Saving Money Holiday Gadgets Chrome Tech Term Virtualization Automation Managed IT Services Managed Service Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Internet of Things Networking IT Support Wi-Fi Hacking Information Technology Covid-19 Alert Managed Service Provider Information Spam Office 365 Telephone Systems Remote Router Employer-Employee Relationship Recovery BDR Bandwidth Social Engineering Mobility Mobile Computing Applications Data Breach Application Law Enforcement Human Resources Remote Monitoring Big Data Password Money App Encryption History Training VPN Government Blockchain Private Cloud Paperless Office Remote Computing How To Managed IT Mobile Office Apps Data Storage Patch Management Office Tips WiFi Google Drive IT solutions Entertainment Gmail Website Servers Budget Settings Avoiding Downtime Two-factor Authentication Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Vulnerability Flexibility Marketing Windows 7 Word Wireless Safety Data Protection The Internet of Things Sports HIPAA Lithium-ion battery Redundancy Vendor Vendor Management Keyboard Managed Services USB Display Firewall Virtual Reality Employee/Employer Relationship Apple RMM Software as a Service Telephone System Staff Save Time Machine Learning Social Connectivity Remote Work User Error Cleaning Meetings Conferencing Risk Management End of Support Hacker Scam Education Physical Security IT Management Cryptocurrency DDoS PDF Botnet SharePoint Printer Managed Services Provider IT Plan Bluetooth Comparison Proactive IT Database Customer Service Unsupported Software CES Best Practice Remote Workers Environment YouTube Charger Fax Server Processor Black Market Business Technology IT Consultant Content Management Access Control Compliance OneNote Computer Care Hard Drive Humor Virtual Assistant SaaS Current Events Authentication Document Management Telephony Solid State Drive Wireless Technology Samsung How to Downtime Network Congestion Computing eWaste Value Update Data storage Spam Blocking Electronic Medical Records Automobile Google Docs Hiring/Firing Identity Theft Digital Signage Computing Infrastructure Going Green Wearable Technology Retail Hard Drives Instant Messaging Virus Excel Robot Procurement Unified Threat Management Battery Augmented Reality Shadow IT Workplace Strategy Fraud Biometrics Net Neutrality Computer Accessories Legal Business Intelligence Virtual Desktop Help Desk Remote Worker Internet Exlporer Audit Printing Worker Science Video Conferencing Public Computer Recycling ROI Notifications Sales Practices Bitcoin Transportation Shortcuts Regulations Wiring Point of Sale Computer Fan Cache Personal Rootkit Amazon Web Services Cryptomining Customer Relationship Management Safe Mode Distributed Denial of Service Supply Chain Management Criminal Monitoring Workers Hosted Computing Batteries Benefits Analyitcs Relocation GDPR Windows 8.1 FENG Wireless Internet Digitize Online Shopping Programming Printer Server Windows Server 2008 R2 Video Games File Sharing IBM Customer relationships Inventory Smart Technology Specifications Worker Commute Flash Camera Email Best Practices Wire Antivirus IT Assessment Evernote Manufacturing Experience Travel Windows 8 Scalability Software Tips Supercomputer Computer Tips Emails IT service Managed IT Service Millennials Security Cameras Business Owner Sync Printers NarrowBand Virtual CIO Smart Office OneDrive Wireless Charging Biometric Security Tablet Search Peripheral Digital Security Cameras Netflix Domains Using Data Two Factor Authentication Workforce iPhone Virtual Private Network Root Cause Analysis Copiers Cables 5G Maintenance Music HBO IaaS Quick Tip Knowledge Ergonomics Nanotechnology Consultant Telecommuting Bloatware Smartwatch Files Skype Project Management Chromecast Data loss Development Cortana OLED Analytics Virtual Machine Troubleshooting Tablets Outlook PCI DSS Leadership Digital Signature Uninterrupted Power Supply 2FA Fiber Optics Best Available Entrepreneur Employee Colocation Start Menu Warranty Screen Mirroring HVAC Messaging Loyalty WIndows 7 Google Apps Cabling Shortcut Hypervisor Books Monitor Frequently Asked Questions Policy Analysis Administrator Dark mode Windows 10s Devices Trend Micro Cost Management Mobile Cast Enterprise Content Management SMS Social Networking Default App Accountants Saving Time Emergency Reputation Tip of the week MSP Streaming Media Procedure webinar Microchip Tech Support dark theme Public Cloud Thought Leadership Shopping Employer Employee Relationship Credit Cards Google Search Content Professional Services Windows Media Player Techology Laptop Password Management Running Cable AI Assessment User Password Manager IT Infrastructure PowerPoint Multi-Factor Security Memory Bing Customers Windows Server 2008 FinTech Tools Search Engine Twitter Social Network Audiobook Touchpad NIST Television Managing Stress Business Mangement Investment Smart Tech Employee/Employer Relationships Trending Employees Advertising Windows 365 Addiction Amazon ISP Cameras Politics

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code