(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Innovation Server Disaster Recovery Business Continuity Workplace Tips Network Data Windows Upgrade Network Security Software Hardware Business Management Communication Computer Save Money Saving Money Mobile Device Management Virtualization Smartphones Android Browser Smartphone Microsoft Office User Tips Managed IT Services Holiday communications Data Backup Outsourced IT WiFi Windows 10 BYOD Small Business Computers Social Media Remote Monitoring Cybercrime Operating System Hacking Chrome Mobile Computing Alert Apple Proactive IT Avoiding Downtime Big Data Application IT Solutions Managed IT Services Quick Tips Ransomware Office Information Technology Budget Social Engineering Collaboration Employer-Employee Relationship Passwords Marketing Cloud Computing The Internet of Things Data Recovery Automation Gadgets Recovery Telephone Systems Mobility Health Bring Your Own Device VPN BDR Going Green Remote Computing spam Bandwidth iPhone Compliance Cybersecurity App Wireless Technology User Error Gmail Private Cloud How To Managed IT Save Time Firewall Vendor Management Two-factor Authentication Internet of Things Retail Memory Windows 10 Search Antivirus Vulnerability Data Security Networking Office Tips Analytics Router Lithium-ion battery Artificial Intelligence Business Intelligence PowerPoint Website Excel Phone System Mouse Content Filtering Money Downtime Redundancy IT Support History Tablet Document Management Office 365 Risk Management Data Management Value Workers Printer Internet Exlporer Mobile Office Customer Relationship Management Business Owner Data storage Biometrics OneNote Identity Theft Current Events Best Available eWaste People Maintenance Programming Hard Drives Credit Cards Network Congestion Work/Life Balance Trending Facebook Intranet Physical Security DDoS Humor Robot Statistics Public Cloud Data Storage Environment Google Drive Phishing Word Human Resources Outlook HIPAA SaaS Training Safety Flexibility Apps IT Consultant Government IT Management Meetings Administration Law Enforcement HaaS Fax Server Solid State Drive Saving Time IT Plan Black Market Entertainment Running Cable CES Online Currency Unsupported Software Skype Unified Threat Management Streaming Media Managing Stress Instant Messaging Cables Sync Colocation Shortcut Content Management Electronic Medical Records Update Windows 8 Remote Work Software Tips LinkedIn SharePoint Virus Encryption Unified Communications Hosted Solution Telephony Computing Infrastructure Print Server Sports Blockchain Bluetooth Google Docs Debate Legal Tablets Monitor Computer Accessories Notifications Theft Start Menu End of Support Audit YouTube Staff USB Voice over Internet Protocol Mobile Device Net Neutrality HBO Video Surveillance Computer Repair Reputation Wearable Technology Cameras Consultant Social Cortana Mobile Internet exploMicrosoft Screen Mirroring NarrowBand Root Cause Analysis Multi-Factor Security Education Fraud Frequently Asked Questions Customers Printer Server Best Practice Social Networking Google Apps Patch Management Professional Services Advertising Cast Chromecast Data loss Worker Commute Lifestyle Piracy Analyitcs Amazon Touchscreen Tip of the week User Infrastructure Scam Tools Laptop Settings Charger Data Protection Licensing Amazon Web Services Windows Server 2008 Samsung Distributed Denial of Service Virtual Desktop Password Manager Twitter Hybrid Cloud Touchpad IT service Computer Care Comparison Virtual Reality Online Shopping Windows 7 Crowdfunding Relocation Uninterrupted Power Supply Spam Blocking Business Mangement Botnet Data Warehousing Domains Specifications Bloatware Evernote Keyboard Regulations IaaS Cleaning Customer Service Recycling Travel Millennials Windows Media Player Entrepreneur Wireless Charging Servers Tech Support Computer Fan Criminal Workforce Hiring/Firing Applications Company Culture Hacker WIndows 7 Cost Management Fiber-Optic Flash Files Windows 8.1 Update Shadow IT FENG Productivity Software as a Service Password Telecommuting Wi-Fi Wireless Science Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride Users IBM Webinar Emergency Digital Signature Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television