Computerware

Tip of the Week: It’s Easy to Color-Code Your Google Drive

Tip of the Week: It’s Easy to Color-Code Your Google Drive

By default, folders in Google Drive display as a muted gray color. Unfortunately, this simplistic choice can make certain folders difficult to find in a sea of gray. For this week’s tip, we’ll go through how to change the color that a folder displays in Google Drive.

First, you will need to navigate to the folder whose color you wish to change. Right-clicking on the folder will bring up a menu. About halfway down the menu, you will find the option Change color, with the image of a painter’s palette and an arrow indicating more options. Those options will be the 24 colors the folder icon can display as.

Once you’ve decided on a color to use for that particular folder, click on it. The change will be made immediately, so you will know right away if your choice of color will work for the folder you have edited.

Unfortunately, this feature doesn’t extend to the contents of these folders. Therefore, your Google Docs and Sheets will have to remain blue and green, respectively.

Keep in mind, you will be the only one that sees these color changes. This feature is more of a means for individual users to customize their own experience with Google Drive. Therefore, describing something as “the red folder” will likely mean something very different for someone else as it does for you.

Will you have a particular system for color-coding your folders? Let us know in the comments, and make sure to subscribe to Computerware’s blog for more handy tips!

Leveraging AI Might Be What Stops Hackers
Bad Rabbit Ransomware Strikes Targets in Eastern E...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Malware Email IT Services IT Support Hosted Solutions Google Network Security Efficiency Small Business Smartphones Quick Tips Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Android Microsoft Office Innovation Mobile Device Management VoIP Social Media Server Smartphone Windows 10 Miscellaneous Upgrade Unified Threat Management Windows Ransomware Remote Monitoring Operating System Collaboration Communication Holiday Mobile Computing Passwords BYOD Remote Computing WiFi Vendor Management Cybersecurity Apps Managed IT services Data Backup Data Recovery IT Support Marketing The Internet of Things Facebook Apple Users Analytics Firewall History Productivity Alert Internet of Things Data Management communications Automation BDR Tech Term Save Money Outsourced IT IT Consultant Artificial Intelligence Phishing Managed IT Services App Content Filtering Going Green Health Mobile Device Office Bandwidth Bring Your Own Device Big data Gmail Spam Cybercrime Printer Tech Support Virus Lithium-ion Battery Best Practice Information Technology Cost Management Managed IT Wireless Technology Budget Antivirus Windows 8 Outlook Encryption Search Hiring/Firing Maintenance Browser Hard Drives Employer-Employee Relationship Computers Travel IBM Hacking Phone System Office 365 Update Help Desk Money Document Management Recovery Running Cable Proactive IT Regulations Saving Time SaaS VPN Intranet Training Education Law Enforcement Hard Drive Compliance It Management Risk Management Business Technology Data storage Administration Customer Service Two-factor Authentication Save Time Cloud Computing Legal Website Networking Government Windows 10 Humor iPhone Project Management Computer Repair Applications Word Social Networking Paperless Office Excel Telephone Systems Disaster Password Cortana Twitter Hosted Solution End of Support Customer Relationship Management Access Control Hacker Robot Securty Augmented Reality Current Events PowerPoint Solid State Drive Data Security User Patch Management Business Intelligence Blockchain Black Market Flexibility Mobility Data Loss Social Engineering Digital Payment Downtime Fax Server Laptop Wireless Business Growth DDoS Tablet Avoiding Downtime Data Breach Comparison Company Culture Digital Mouse Websites Pain Points Retail Telephony YouTube Machine Learning Unified Communications Settings Start Menu Tech Terms Programming Sports Taxes eWaste Statistics Computing Value Network Congestion Distributed Denial of Service Mobile Technology Software as a Service Public Cloud Uninterrupted Power Supply IT service Streaming Media Processors USB Bitcoin Identity Theft Gaming Console Co-managed IT Data Protection Presentation User Error Google Maps Bluetooth Webcam Text Messaging Net Neutrality Virtual Desktop Virtual Reality Specifications Safety Chrome Politics Automobile Cryptocurrency Vulnerabilities Emails Social Scam Router Lifestyle Chromebook Healthcare Google Docs Documents Redundancy Heating/Cooling Computing Infrastructure Experience Hack Computer Accessories How To Cleaning Storage Monitors Inbound Marketing Private Cloud Download Office Tips Trending Best Available Keyboard Virtual Assistant Microserver Wi-Fi Staffing Screen Reader Administrator Google Wallet Technology Tips Books Windows XP Gamification Workers Fake News Skype Smart Tech Society Audit Domains Archive Piracy Upload Supercomputer Displays HTML Worker Public Speaking Get More Done Fiber-Optic Microchip Database Micrsooft Data Warehousing Samsung Emergency Shortcut Point of Contact Hard Drive Disposal Turn Key Conferencing Drones Access Printer Server Mobile Security Reading Entrepreneur Microsoft Excel Multi-Factor Security G Suite Upselling Troubleshooting Computer Care Trojan Software License Trends Employer Employee Relationship Organize Devices Permissions Licensing Language HIPAA Fraud Hacks Tactics Physical Security Video Surveillance Google Drive Environment Windows Server 2008 UTM Relocation Content Tablets Saving ZTime Vulnerability Competition Analytic Banking Monitoring Botnet Spyware Electronic Payment Recycling Mobile Payment Product Reviews Legislation Sync Music Electricity Business Owner Printing IT Plan File Sharing switches Enterprise Resource Planning Writing Accountants Harddrive IP Address Read email scam Notifications Addiction CCTV Upgrades Debate Windows 7 Webinar Multi-factor Authentication Reliable Computing LiFi Information Application Business Metrics Management Computer Malfunction GPS cache Television Human Resources Wireless Headphones In Internet of Things WannaCry Device Management Downloads Migration Connected Devices External Harddrive Equifax Work/Life Balance Corporate Profile Content Management Network Management Deep Learning Time Management Freedom of Information Business Managemenet Device security Scalability Visible Light Communication Memory Thin CLient Digital Signature Motion Sickness 3D Ebay Assessment SharePoint Smart Phones Teamwork Tip of the week Nanotechnology Entertainment Google Calendar online Currency Desktop Messenger IT consulting Finance Tracking News Startup VoIP Best Practives Business Cards Rental Service Service Level Agreement Meetings Touchscreen Advertising Cabling Flash Leadership Knowledge Unified Threat Management CIO Backup and Disaster Recovery Web Server Adminstration Pirating Information Consultation PDF Evernote LinkedIn Capital Managing Stress Productuvuty MSP CrashOverride 3D Printing Username

toner1.7