Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Zipping and Unzipping Files

Tip of the Week: Zipping and Unzipping Files

Large files like videos aren’t exactly the ideal attachments for something like an email. There are also cases where you have to send multiple files, some of which may be large, attached to an email, but when the files are too large, this just won’t work. Thankfully, there are some ways around this, one of which is to compress files into a .zip file with a tool found in Windows 10.

There are tools besides the ones built into Windows 10, like the free and open-source 7-ZIP, which allow you to compress and decompress files; for the purposes of this blog, however, we want to focus on the built-in functionality of Windows 10.

First, let’s explain what compression and decompression actually does to the files; please note that we will use the terms “zip” and “unzip” files when referring to these processes moving forward. When you compress a file, it becomes a more compact format that can easily be transferred. This process helps to reduce the file size of the files. A ZIP folder is one which stores these compressed folders or files.

Windows 10 has made great strides in terms of transparency and accessibility of compression/decompression. Windows now allows you to view the contents of a zipped folder just by opening it like any other folder (it used to be the case that you would have to decompress it first). You can then use this information to determine whether or not you want to extract (or unzip) the contents of the folder to your PC. Any edits made to these files will not be permanent until you extract them.

Zipped files are easily identifiable by the zipper that runs up and down the icon, as well as the file type being .ZIP. To unzip a specific file, click and drag the file to the extraction location. Alternatively, if you would rather just unzip all contents of the folder, you can right-click the .ZIP file and click Extract All. If you are in the folder already, you can click the button from within the folder. You will have to choose an extraction location next. In the end, all extracted files will go to your desired location.

As for the extraction location, click on the Browse option and find the folder you want to extract your files to. Once you have the destination selected, click on the Extract button. Depending on how large the files are, it might take some time, but the process is simple enough and quick enough that it shouldn’t take too long before you see the unzipped folder in your desired location.

Did you find this trick helpful? Let us know in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Data Backup Ransomware Outsourced IT Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Tech Term Virtualization Managed IT Services Automation Managed Service Microsoft Office Computers Facebook Artificial Intelligence Cybercrime Operating System BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Health Hacking Telephone Systems Information Technology Alert Remote Managed Service Provider Information Spam Covid-19 Office 365 Router BDR Bandwidth Employer-Employee Relationship Recovery Social Engineering Mobility Mobile Computing App History Law Enforcement Application Human Resources Password Big Data Money Remote Monitoring Encryption Applications Data Breach Government Office Tips Training Private Cloud How To VPN Blockchain Managed IT Paperless Office Data Storage Apps Remote Computing Patch Management Mobile Office WiFi IT solutions Entertainment Avoiding Downtime Website Budget Wireless Data Security Gmail Settings Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Vulnerability Mouse Infrastructure Windows 7 Voice over Internet Protocol HaaS Word Flexibility Google Drive Marketing Servers Data Protection Keyboard RMM Risk Management Hacker USB The Internet of Things Lithium-ion battery Save Time Staff Software as a Service Telephone System Firewall Machine Learning Cleaning Connectivity Remote Work Virtual Reality Apple Conferencing Vendor Social Managed Services End of Support Scam Display Education Physical Security User Error Safety Meetings Sports HIPAA Vendor Management Employee/Employer Relationship Redundancy Robot Unsupported Software Excel Cryptocurrency Proactive IT Charger Printer Biometrics Computing Virtual Desktop Bluetooth Best Practice YouTube Comparison Compliance Computer Care Black Market OneNote Current Events DDoS CES Telephony Samsung Digital Signage SharePoint Document Management IT Consultant Business Technology Content Management Wireless Technology Access Control Solid State Drive How to Value Downtime Customer Service Humor Virtual Assistant Authentication Environment Spam Blocking Procurement Electronic Medical Records Net Neutrality Data storage Workplace Strategy Fax Server Automobile Help Desk Hiring/Firing Printing Update Computing Infrastructure SaaS Going Green Google Docs Managed Services Provider Network Congestion Identity Theft Business Intelligence Battery Database eWaste Shadow IT Legal Worker Virus Audit Remote Workers IT Management Internet Exlporer Unified Threat Management Processor Augmented Reality Computer Accessories Botnet Fraud IT Plan Wearable Technology Retail Hard Drives Hard Drive PDF Remote Worker Instant Messaging Copiers IBM 5G Relocation Running Cable Recycling Practices Flash Quick Tip Memory Smart Technology Wiring Video Games Smartwatch Cache Amazon Web Services Ergonomics Software Tips Development Worker Commute Supercomputer OLED Safe Mode Criminal Hosted Computing Sync PCI DSS Experience Emails Virtual Machine GDPR Fiber Optics Scalability Employee Printer Server Wireless Internet Online Shopping 2FA Messaging Science Business Owner Cabling File Sharing NarrowBand Inventory Specifications Policy Netflix Hypervisor Two Factor Authentication Camera Trend Micro Search Wire Evernote Dark mode Root Cause Analysis Customer Relationship Management HBO Travel SMS Knowledge Default App iPhone Music Distributed Denial of Service Printers Skype Millennials Procedure Analyitcs Saving Time Shopping Google Search Smart Office Wireless Charging dark theme Programming Data loss Outlook AI Leadership IT Infrastructure Files Troubleshooting Virtual Private Network Bing Chromecast Start Menu Workforce FinTech Social Network Loyalty Antivirus Cables Screen Mirroring Frequently Asked Questions Windows 8 Investment Colocation Books Uninterrupted Power Supply Project Management Nanotechnology IT service Mobile Telecommuting Employees Windows 10s Employee/Employer Relationships Consultant Cast ISP Monitor Analytics Cortana Windows 365 Digital Signature Tip of the week Video Conferencing Tablet webinar ROI Emergency Employer Employee Relationship Best Available Warranty Shortcuts Domains Professional Services Sales Public Cloud Bitcoin Personal Assessment WIndows 7 Cryptomining Reputation HVAC Streaming Media Google Apps Point of Sale Analysis Maintenance Windows Server 2008 Supply Chain Management Content IaaS Tech Support Techology Administrator Laptop Devices Tools Monitoring Bloatware Batteries Digitize Television Customers Enterprise Content Management Windows 8.1 Accountants Tablets Audiobook Windows Server 2008 R2 MSP Microchip Touchpad Thought Leadership Credit Cards Customer relationships Entrepreneur IT Assessment Public Computer User Manufacturing PowerPoint Password Management Windows Media Player Password Manager Email Best Practices Shortcut Regulations Multi-Factor Security Politics Advertising Transportation Rootkit Search Engine Security Cameras Twitter Computer Tips Cost Management Computer Fan Managed IT Service Social Networking OneDrive Managing Stress Biometric Security NIST Notifications Business Mangement Virtual CIO Smart Tech Trending Peripheral Workers Benefits Cameras Addiction Amazon Digital Security Cameras FENG Using Data

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code