Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Better Way to Take a Screenshot on Windows

Tip of the Week: The Better Way to Take a Screenshot on Windows

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Phishing Windows Outsourced IT Data Backup Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Virtualization Tech Term Saving Money Holiday Social Media Gadgets Chrome Managed IT Services Automation Microsoft Office Managed Service Computers Facebook Operating System Artificial Intelligence Cybercrime BYOD Mobile Device Management Networking Internet of Things IT Support Hacking Health Wi-Fi Spam Remote Office 365 Telephone Systems Information Technology Covid-19 Managed Service Provider Alert Information Router Bandwidth BDR Recovery Employer-Employee Relationship Social Engineering Mobility Remote Monitoring Encryption Data Breach Mobile Computing Applications Application App History Law Enforcement Big Data Human Resources Password Money Mobile Office Government Office Tips Training How To Private Cloud Blockchain VPN Paperless Office Managed IT Data Storage Patch Management Remote Computing Apps Windows 7 Flexibility Voice over Internet Protocol Word Mouse Marketing HaaS WiFi Servers IT solutions Google Drive Entertainment Website Budget Avoiding Downtime Data Security Wireless Gmail Settings Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Vulnerability Infrastructure Scam Social End of Support Education Physical Security User Error Safety Meetings Vendor Management Sports HIPAA Redundancy Data Protection USB Keyboard Risk Management Hacker Vendor The Internet of Things Lithium-ion battery Managed Services Display Save Time Telephone System Staff Software as a Service Firewall Employee/Employer Relationship Machine Learning Connectivity Remote Work RMM Cleaning Conferencing Virtual Reality Apple Computer Accessories Network Congestion Battery Audit Worker eWaste Digital Signage IT Management Shadow IT Augmented Reality Legal Botnet Fraud IT Plan Internet Exlporer Remote Worker Printer Procurement Wearable Technology Bluetooth Workplace Strategy Net Neutrality Retail Hard Drives PDF Unsupported Software Cryptocurrency Instant Messaging Help Desk Robot Excel Charger Proactive IT Printing Biometrics Compliance Comparison Virtual Desktop IT Consultant OneNote Best Practice Computer Care YouTube Current Events CES Telephony Black Market Managed Services Provider DDoS Humor Samsung Business Technology Content Management Database Access Control SharePoint Remote Workers Document Management Value Virtual Assistant Wireless Technology Solid State Drive How to Downtime Spam Blocking Authentication Electronic Medical Records Processor Customer Service Environment Data storage Hiring/Firing Hard Drive Fax Server Automobile Update Computing SaaS Computing Infrastructure Going Green Virus Google Docs Identity Theft Unified Threat Management Business Intelligence MSP Laptop Accountants Messaging Cabling Bloatware Techology Managing Stress Microchip Customers Thought Leadership Policy Credit Cards Hypervisor Public Computer Password Manager Trend Micro Audiobook Tablets Password Management Dark mode Regulations Touchpad Cameras SMS Transportation Multi-Factor Security Default App Entrepreneur Search Engine Computer Fan Twitter Procedure Rootkit Saving Time dark theme Business Mangement Shopping Google Search Shortcut Politics Advertising NIST Workers Smart Tech AI Benefits Trending IT Infrastructure Cost Management Bing Social Networking FENG Addiction Notifications FinTech Amazon IBM Recycling Social Network Flash Wiring Printer Server Practices Smart Technology Investment Employee/Employer Relationships Running Cable Relocation Cache Employees Amazon Web Services Windows 365 Supercomputer Criminal ISP Memory Software Tips Safe Mode Video Games Sync GDPR Emails Hosted Computing Video Conferencing ROI Bitcoin Shortcuts Worker Commute Wireless Internet Sales Online Shopping Point of Sale Personal Cryptomining Experience File Sharing Scalability Camera Netflix Inventory Supply Chain Management Two Factor Authentication Specifications Batteries Business Owner Science Root Cause Analysis Wire Monitoring Evernote NarrowBand Windows 8.1 Knowledge Digitize Music Travel HBO Search Skype Printers Millennials Windows Server 2008 R2 Wireless Charging Distributed Denial of Service Customer Relationship Management iPhone Data loss Smart Office Customer relationships Consultant Email Best Practices Leadership IT Assessment Troubleshooting Manufacturing Analyitcs Outlook Programming Start Menu Virtual Private Network Analytics Workforce Cables Managed IT Service Security Cameras Files Screen Mirroring Computer Tips Loyalty Best Available Chromecast Virtual CIO OneDrive Books Biometric Security Frequently Asked Questions Mobile WIndows 7 Project Management Windows 10s Nanotechnology Peripheral Telecommuting Antivirus Cortana Using Data Windows 8 Colocation Cast Uninterrupted Power Supply Digital Security Cameras webinar Digital Signature Copiers Emergency 5G IT service Tip of the week Professional Services Warranty Monitor Public Cloud Quick Tip Employer Employee Relationship Google Apps Smartwatch Tablet HVAC Ergonomics Assessment Windows Server 2008 Analysis Development OLED Domains Tools User Administrator Reputation PowerPoint Devices Streaming Media PCI DSS Windows Media Player Virtual Machine Television Fiber Optics IaaS Employee Maintenance Content Enterprise Content Management Tech Support 2FA

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code