facebook linkedin twitter

Computerware Blog

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

The Windows operating system has quite a few shortcuts baked in, each offering a user quicker access to the utility they are seeking out. It may sound crazy, but using these keyboard shortcuts can actually eliminate the eight days the average employee accumulates every year by just moving their hand from their keyboard to their mouse. 

In the interest of helping you save some time, we’ve assembled some shortcuts to help speed up some of the tasks that take a little longer.

Rotate Screen

Okay, this one isn’t so much a task as it is a way to keep office pranksters from wasting too much of your staff’s valuable time. An easy prank to play on someone who left their workstation unlocked is to rotate their screen with a quick shortcut. In order to level the playing field, this can be undone with the same shortcut: Ctrl + Alt + Arrow Key

Use this shortcut responsibly!

Switch Between Open Windows

Sometimes, you find yourself losing the window you need behind all the others you’ve opened up. While you could hover over the corresponding application in the taskbar to find it, it is probably faster to use the Alt + Tab shortcut to cycle through a layover window that displays all of your open windows to select the appropriate one. This can also be a handy way to see what windows you still have open, letting you determine which ones can be closed.

Snap Windows

Windows allows users to leverage a split-screen functionality by snapping application windows to the edges of the screen, dividing it equally between them. While you could finagle with clicking and dragging the windows to the sides until they reshape the way you want, it is much easier to simply press Windows Key + Left/Right Arrow Key to accomplish the same thing. If you want to snap your Window to a specific corner, dividing your screen into quarters, press the Up/Down Arrow Key immediately after the Left/Right Arrow Key.

Once you’re ready to maximize a window again, Windows Key + Up Arrow Key will allow you to do so.

Quick Shut Down

Clicking through menus can be a pain - especially when you’re just trying to shut down, or log out, or something simple like that. Thanks to this Windows shortcut and the Quick Access Menu, however, there’s a much more convenient way.

By pressing the Windows Key + X and combining it with the following keys, you can accomplish quite a few very common processes:

U - Shut Down
I - Sign Out
R - Restart
H - Hibernate
S - Sleep

Create Your Own Desktop Keyboard Shortcut

Finally, if you have a particular folder or application you frequently utilize and you keep on your desktop, you can create a keyboard shortcut that allows you to access it quickly. Right click the icon on your desktop and select Properties. You should see an empty field labeled Shortcut key. Simply click to select the field and press your desired shortcut key. This will create your new shortcut: Ctrl + Alt + [whatever key you chose].

What other shortcuts do you frequently use? Share them in the comments, and subscribe to our blog for more tips, tricks, and technology best practices!

Is It Fair to Be Fired for Falling for a Phishing…...
Your Guide to the Malware You Could Encounter
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 11, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support IT Support Smartphones Quick Tips Data Backup Mobile Devices communications Network Business Continuity Microsoft Office Gadgets Android Social Media Disaster Recovery Cybersecurity Data Recovery Upgrade Mobile Office Server Communication Phishing Smartphone Virtualization Miscellaneous Mobile Device Management Holiday Vendor Management Ransomware Managed IT Services Tech Term Outsourced IT Operating System Passwords Apps Windows 10 Windows Mobile Device Users Remote Monitoring Internet of Things Unified Threat Management Facebook Automation BDR Data Management Analytics Mobile Computing BYOD Remote Computing Apple Managed IT services WiFi Windows 10 Artificial Intelligence Cloud Computing History The Internet of Things Training Marketing Browser Firewall Save Money Encryption Business Technology Alert Help Desk Big data Spam App Office Office 365 Health Two-factor Authentication IT Consultant Bandwidth Information Technology Windows 7 Maintenance Printer Bring Your Own Device Budget Antivirus Gmail Government Hard Drives Cybercrime Access Control Managed IT Content Filtering Going Green Cost Management Information Tech Support Healthcare Virus Wireless Technology Search Managed Service Hiring/Firing Recovery Employer-Employee Relationship Windows 8 Outlook Retail Best Practice Computers Lithium-ion Battery Saving Time VPN Travel Data Security It Management IBM Hacking Remote Work Education Humor Augmented Reality Blockchain Data Loss Networking Update Customer Service Computing Phone System Project Management Money Document Management iPhone Twitter Hard Drive Intranet Customer Relationship Management Hacker Mobility Patch Management Covid-19 PowerPoint Legal Risk Management Regulations Data Breach Administration Voice over Internet Protocol Save Time Applications Wireless Downtime SaaS Current Events Conferencing Avoiding Downtime Storage Website Law Enforcement Computer Repair Running Cable Proactive IT Compliance Solid State Drive Data storage Password Vendor Flexibility Value File Sharing Management Cryptocurrency Google Maps Laptop Vulnerabilities Business Growth Social Engineering Scam User Net Neutrality Business Intelligence Virtual Desktop Meetings Paperless Office Digital Payment Private Cloud Sports Social Disaster Router Wi-Fi Digital DDoS End of Support Telephony Websites Hosted Solution Comparison Tablet Machine Learning Robot Securty Telephone Systems Company Culture Software as a Service Social Networking Monitoring Word Cooperation Fax Server Cortana Excel Black Market Data Protection Processor Multi-factor Authentication Google Docs Telephone Memory Processors Streaming Media Virtual Reality Downloads Politics Experience Automobile Solutions Monitors USB Emails Cleaning Gaming Console Professional Services Office Tips Chromebook Presentation Text Messaging Computing Infrastructure Hack Webcam Redundancy Specifications Safety How To YouTube Integration Chrome Download Evernote Unified Communications Settings Distribution Documents Virtual Assistant Entertainment Teamwork Heating/Cooling Computer Accessories Smart Devices Managed Services Provider Start Menu Tech Terms Inbound Marketing Co-managed IT Microchip Taxes User Error How To Cost Distributed Denial of Service Mobile Technology IT service Trending Employee/Employer Relationship Mouse Managed Services Public Cloud Uninterrupted Power Supply Licensing Managed IT Service Pain Points Vulnerability eWaste Programming Bluetooth Lifestyle Statistics Identity Theft Network Congestion Bitcoin Remote Working Microsoft 365 Deep Learning Entrepreneur Notifications CCTV Managing Costs Upselling Work/Life Balance Best Practives Troubleshooting Reliable Computing Medical IT Trend Micro Video Surveillance Wireless Headphones Environment Business Metrics Computer Malfunction cache Television Browsers Visible Light Communication Migration Connected Devices HIPAA Threats Equifax Fleet Tracking Electronic Payment Analytic In Internet of Things Financial Data WannaCry User Tip IT consulting Proactive Maintenance Saving ZTime Microserver Network Management Competition Recycling Electronic Health Records Security Cameras Product Reviews Corporate Profile Memes Time Management Freedom of Information Navigation Virtual Machine Device security MSP Business Owner Scalability Managing IT Services CIO eCommerce Debate Nanotechnology Social Network Read Motion Sickness Assessment SharePoint Data Analysis Advertising Employees Harddrive Flash Get More Done Desktop Finance IP Address GDPR Google Wallet Managing Risk GPS Printer Server Startup Asset Tracking Human Resources Telework Google Calendar Windows XP SQL Server Turn Key Business Cards Service Level Agreement Application Messenger Surveillance Tracking Tip of the week Staffing Remote Workers VoIP External Harddrive Displays Unified Threat Management Backup and Disaster Recovery Device Management Rental Service IT Touchscreen News Tech Society Hypervisor Trojan Username Business Managemenet Virtual Private Network Cabling Knowledge Micrsooft Holidays Organize Screen Reader Customer Resource management Content Management Web Server Consultation Fileless Malware Hybrid Cloud Gamification Modem Drones Strategy 3D Ebay Smart Tech Administrator FinTech Technology Tips Proxy Server Azure Thin CLient Piracy Upload Digital Signature Books Development Workers Data Storage Audit Electronic Medical Records Transportation Smart Phones Fiber-Optic Database online Currency Supercomputer Fake News Term HTML Procurement Worker Recording Optimization Telephone System Data Warehousing Directions Permissions Display Language Mobile Security Emergency Hard Drive Disposal SSID Adminstration Pirating Information Webinar Multi-Factor Security PDF Access Dark Web Free Resource Leadership Software License Trends LinkedIn Reading Video Conferencing Samsung Devices G Suite PCI DSS Computer Care Health IT switches Writing Fraud Tactics Best Available Keyboard Communitications Employer Employee Relationship Microsoft Excel Processing Music Skype Supply Chain Management Logistics Upgrades Virtual Machines Archive Hacks Physical Security Google Drive Windows Server 2008 Wasting Time UTM Content Domains Internet Service Provider Tablets Cyber security Legislation Error Banking Botnet Spyware Mobile Payment Bookmark LiFi IT Plan Enterprise Resource Planning Public Speaking Relocation Accountants A.I. Point of Contact Sync Regulations Compliance Electricity Printing Employer/Employee Relationships email scam Addiction Shortcut IT Assessment Google Play Telephone Service Financial 3D Printing CrashOverride Printers Capital Managing Stress Regulation Productuvuty Personal Information

toner1