(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Hosted Solutions Internet Malware Backup Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Miscellaneous Managed Service Provider Server Data Innovation Network Disaster Recovery Business Continuity Workplace Tips Software Windows Upgrade Business Management Communication Saving Money Hardware Mobile Device Management Android Virtualization Computer Browser Smartphone Save Money Managed IT Services Data Backup User Tips communications Smartphones Cybercrime Microsoft Office Holiday BYOD WiFi Windows 10 Outsourced IT Computers Small Business Data Recovery Hacking Chrome Big Data Social Media Remote Monitoring Operating System Mobile Computing Ransomware Cloud Computing VPN Managed IT Services Apple Proactive IT Application Avoiding Downtime Automation Internet of Things IT Solutions Collaboration Alert BDR Employer-Employee Relationship Information Technology Passwords Marketing The Internet of Things Office Budget Social Engineering Quick Tips Bring Your Own Device Gadgets spam Cybersecurity Going Green Remote Computing Bandwidth Managed IT Recovery Tech Term Mobility Health Telephone Systems Gmail iPhone Private Cloud Website Router Vulnerability Data Security Save Time Firewall Redundancy Artificial Intelligence Two-factor Authentication Data Protection How To Compliance Business Intelligence Vendor Management Wireless Technology IT Support User Error App Antivirus Lithium-ion battery Productivity Windows 10 PowerPoint Analytics Excel Phone System Content Filtering Money Downtime Mouse Identity Theft History Tablet Value Office 365 Data Management Retail Memory Search Phishing Apps Networking Document Management Office Tips Risk Management Law Enforcement Applications Humor Statistics Smart Tech IT Plan Physical Security DDoS Robot Current Events Workers CES Environment Maintenance Unsupported Software Google Drive Outlook Business Owner Update Human Resources OneNote SaaS Training Flexibility Safety Mobile Device Government Administration Cleaning Work/Life Balance Intranet Meetings Credit Cards Entertainment HaaS Running Cable Fax Server Black Market Skype Data loss Unified Threat Management Mobile Office Public Cloud Streaming Media Customer Relationship Management Internet Exlporer Infrastructure IT Consultant Data Storage Data storage Encryption Best Available Biometrics HIPAA People Word Saving Time Comparison Programming eWaste Network Congestion Trending Hard Drives Online Currency Facebook Printer IT Management Solid State Drive Best Practice Social Networking Wireless Charging Servers User Wireless Internet Chromecast Criminal Files Password Analyitcs Workforce Print Server FENG Licensing Wi-Fi Samsung Fiber-Optic Flash Software as a Service Twitter Laptop Settings Colocation Insurance Telecommuting Electronic Medical Records Distributed Denial of Service Crowdfunding Virtual Desktop Net Neutrality Cables Computer Repair Sync Touchpad Hosted Solution IT service Content Management Computing Infrastructure Practices Legal Virtual Reality Remote Work Software Tips Relocation Uninterrupted Power Supply Unified Communications Telephony Google Docs Domains Blockchain End of Support Hosted Computing Bloatware Windows Media Player IaaS Customer Service Touchscreen Theft Start Menu Voice over Internet Protocol Audit Staff Internet exploMicrosoft Inventory Entrepreneur HBO Root Cause Analysis Hiring/Firing Tech Support Cortana Mobile WIndows 7 Multi-Factor Security Screen Mirroring Patch Management Digital Signature Advertising Hacker Access Control Cost Management Fraud Frequently Asked Questions Thought Leadership Shadow IT Google Apps Professional Services Managing Stress Science Lifestyle Cast Scam Wireless Strategy Authentication LinkedIn Instant Messaging Amazon Tip of the week Virus Charger Content Filter Shortcut Tools Windows 8 Debate SharePoint Analysis Hybrid Cloud Nanotechnology Amazon Web Services Windows Server 2008 Computer Accessories Computer Care Storage Sports Password Manager Bluetooth Tablets Spam Blocking Monitor Accountants PDF Notifications Connectivity Video Surveillance Company Culture Online Shopping Windows 7 Cameras Consultant Addiction YouTube Keyboard Business Mangement USB Windows 8.1 Update Botnet Specifications Data Warehousing Reputation Education Wearable Technology Devices Social Evernote Regulations Printer Server Cache NarrowBand Recycling Travel Millennials Computer Fan Worker Commute Customers Piracy IoT Assessment Music Television Wire Troubleshooting Techology Users Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication