facebook linkedin twitter

Tip of the Week: It’s Easy to Color-Code Your Google Drive

Tip of the Week: It’s Easy to Color-Code Your Google Drive

By default, folders in Google Drive display as a muted gray color. Unfortunately, this simplistic choice can make certain folders difficult to find in a sea of gray. For this week’s tip, we’ll go through how to change the color that a folder displays in Google Drive.

First, you will need to navigate to the folder whose color you wish to change. Right-clicking on the folder will bring up a menu. About halfway down the menu, you will find the option Change color, with the image of a painter’s palette and an arrow indicating more options. Those options will be the 24 colors the folder icon can display as.

Once you’ve decided on a color to use for that particular folder, click on it. The change will be made immediately, so you will know right away if your choice of color will work for the folder you have edited.

Unfortunately, this feature doesn’t extend to the contents of these folders. Therefore, your Google Docs and Sheets will have to remain blue and green, respectively.

Keep in mind, you will be the only one that sees these color changes. This feature is more of a means for individual users to customize their own experience with Google Drive. Therefore, describing something as “the red folder” will likely mean something very different for someone else as it does for you.

Will you have a particular system for color-coding your folders? Let us know in the comments, and make sure to subscribe to Computerware’s blog for more handy tips!

Leveraging AI Might Be What Stops Hackers
Bad Rabbit Ransomware Strikes Targets in Eastern E...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Disaster Recovery Innovation Microsoft Office Android Mobile Office Virtualization Network Social Media Mobile Device Management Server VoIP Collaboration Communication Smartphone Miscellaneous Upgrade Ransomware Windows 10 Unified Threat Management Data Backup Windows Data Recovery Operating System Passwords Remote Monitoring IT Support Tech Term Vendor Management BYOD Remote Computing Productivity Holiday Mobile Computing Managed IT services WiFi communications Apps Facebook Cybersecurity Marketing BDR The Internet of Things Analytics History Apple Firewall Automation Users Data Management Alert Phishing Outsourced IT Internet of Things Mobile Device Managed IT Services IT Consultant App Artificial Intelligence Big data Browser Save Money Health Office Content Filtering Going Green Bandwidth Gmail Maintenance Spam Bring Your Own Device Encryption Antivirus Search Cost Management Office 365 Budget Windows 8 Lithium-ion Battery Outlook Best Practice Information Technology Two-factor Authentication Managed IT Printer Cybercrime Tech Support Help Desk Hiring/Firing Virus Hard Drives Wireless Technology Computers Saving Time Hacking Phone System VPN Travel Update Training IBM Money Recovery Employer-Employee Relationship Document Management Cloud Computing Business Technology Networking Legal Regulations Intranet Windows 10 Education SaaS Risk Management Customer Service Law Enforcement Hard Drive Access Control Save Time Compliance Government Humor Website Data storage It Management Running Cable Administration Proactive IT Social Networking Password Cortana Data Loss Business Growth Hacker Twitter Data Breach Current Events Avoiding Downtime Machine Learning Paperless Office Project Management iPhone Telephone Systems Sports Computing User Disaster End of Support Information Hosted Solution Excel Fax Server Robot Business Intelligence Wireless Securty File Sharing DDoS Customer Relationship Management Digital Payment Downtime Solid State Drive Augmented Reality Mobility PowerPoint Comparison Tablet Flexibility Data Security Black Market Social Engineering Applications Company Culture Word Patch Management Blockchain Computer Repair Laptop How To Managed Service Value Experience Monitors Private Cloud Scam Programming Cleaning Download Conferencing Statistics Redundancy Network Congestion Office Tips Inbound Marketing Processors Telephony YouTube Co-managed IT USB Monitoring Taxes User Error Streaming Media Unified Communications Settings Distributed Denial of Service Digital Presentation Websites Pain Points Safety Public Cloud Start Menu Tech Terms Virtual Desktop Management Specifications Social Mobile Technology Lifestyle Net Neutrality Software as a Service Documents IT service Identity Theft Chrome Vulnerabilities Entertainment Uninterrupted Power Supply Heating/Cooling Healthcare Google Maps Router Storage Bitcoin Bluetooth Virtual Reality Computer Accessories Gaming Console Politics Automobile Data Protection Emails Webcam Cryptocurrency Vendor Chromebook Trending Retail Text Messaging eWaste Computing Infrastructure Hack Mouse Google Docs Trojan Skype IT consulting HTML Corporate Profile Archive Shortcut Browsers Fiber-Optic Rental Service Database Meetings Time Management Freedom of Information Mobile Security Cabling Organize Thin CLient Entrepreneur User Tip Web Server Telephone System Assessment SharePoint 3D Troubleshooting Ebay Software License Books Trends Workers Tip of the week Smart Phones Point of Contact Environment Advertising Flash Wi-Fi Multi-Factor Security Administrator Cost Google Calendar HIPAA CIO Electronic Payment Windows XP Devices VoIP Competition Staffing Google Wallet Data Analysis Fraud Tactics Supercomputer Touchscreen News Displays UTM Content Worker Knowledge Leadership Society Microchip Consultation Evernote Adminstration Business Owner Pirating Information IT Plan Reading Enterprise Resource Planning Samsung Virtual Assistant Webinar Analytic Legislation Error Technology Tips Recycling IP Address Micrsooft Fake News Product Reviews Human Resources Accountants G Suite A.I. Audit Application Drones email scam Addiction Employer Employee Relationship Multi-factor Authentication Licensing Read Proxy Server Hacks Physical Security Data Warehousing Migration Relocation Connected Devices Tablets Emergency Hard Drive Disposal Permissions Electronic Medical Records Language Banking Wireless Headphones Botnet Telephone Access Microsoft Excel Equifax Sync Fleet Tracking Computer Care Device Management Upselling Digital Signature Network Management Business Managemenet Video Surveillance switches Writing Device security MSP Content Management Teamwork Music Dark Web Notifications CCTV Google Drive Windows Server 2008 Best Practives Upgrades Desktop Reliable Computing Finance Vulnerability Saving ZTime Health IT Business Metrics Nanotechnology Computer Malfunction Social Network Spyware Mobile Payment Service Level Agreement PDF LiFi Startup In Internet of Things Asset Tracking Electricity Printing Microserver online Currency Business Cards Debate Username Harddrive Best Available Keyboard Bookmark Unified Threat Management Backup and Disaster Recovery Windows 7 Deep Learning Scalability Gamification Work/Life Balance Screen Reader Motion Sickness Customer Resource management cache Television Get More Done GPS LinkedIn Domains Piracy Messenger Upload Tracking Printer Server External Harddrive Visible Light Communication Memory Smart Tech Distribution WannaCry Downloads Turn Key Public Speaking 3D Printing Managing Stress CrashOverride Regulation Printers Capital Fileless Malware Productuvuty