(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Disaster Recovery Business Continuity Workplace Tips Network Data Innovation Upgrade Email Software Windows Hardware Computer Save Money Saving Money Business Management Communication Smartphones Mobile Device Management Virtualization Managed IT Services Browser Network Security Microsoft Office User Tips Windows 10 WiFi Smartphone Holiday Android Social Media Operating System communications Mobile Computing Data Backup BYOD Hacking Chrome Outsourced IT Application Proactive IT Remote Monitoring Avoiding Downtime IT Solutions Computers Cybercrime Small Business Apple Information Technology Automation Passwords Marketing Office The Internet of Things Budget Collaboration Ransomware Alert Quick Tips Social Engineering Big Data Employer-Employee Relationship spam Going Green Remote Computing Managed IT Services Mobility Health Bring Your Own Device VPN Recovery Save Time Firewall Data Recovery Managed IT Wireless Technology User Error Vendor Management iPhone Cybersecurity Telephone Systems Gadgets App Phone System Content Filtering Analytics BDR Router Downtime Private Cloud History How To Tablet Mouse Artificial Intelligence Retail Memory Search Redundancy Bandwidth Cloud Computing Office 365 Compliance IT Support Two-factor Authentication Networking Windows 10 Office Tips Antivirus PowerPoint Website Gmail Lithium-ion battery Excel Physical Security DDoS Robot Flexibility Money Google Drive Public Cloud Environment Administration IT Management Phishing Entertainment Intranet SaaS Running Cable Safety Value Unified Threat Management Government Skype Meetings Unsupported Software Mobile Office Customer Relationship Management HaaS Fax Server Black Market Law Enforcement Apps IT Consultant Best Available Data Management Solid State Drive Vulnerability People Programming Internet of Things Data Security Network Congestion Saving Time Trending Internet Exlporer Data storage Document Management Risk Management Biometrics Online Currency Business Owner Humor Statistics Printer Hard Drives Work/Life Balance Facebook Data Storage Current Events Outlook Word Maintenance Business Intelligence Net Neutrality Computer Repair Patch Management Advertising Windows 7 Analyitcs Data loss Botnet Laptop Specifications Settings Data Warehousing Windows Media Player Scam Distributed Denial of Service Regulations Virtual Desktop Travel Touchpad Millennials IT service Human Resources Touchscreen Hiring/Firing Relocation Hybrid Cloud Servers Virtual Reality Training WIndows 7 Computer Care Uninterrupted Power Supply HIPAA Workforce Domains IT Plan Spam Blocking IaaS Flash Bloatware Customer Service Managing Stress Cleaning Software as a Service Virus LinkedIn Sync Entrepreneur Update Tech Support Debate Software Tips Hacker Computer Accessories Computer Fan Telephony Cost Management Google Docs Shadow IT Applications Wireless Files Science Cameras FENG Productivity Video Surveillance Streaming Media Start Menu Instant Messaging Voice over Internet Protocol Shortcut Audit Consultant Wi-Fi Education SharePoint Colocation HBO Windows 8 Company Culture Workers Printer Server Windows 8.1 Update Encryption Mobile Multi-Factor Security Screen Mirroring Bluetooth Sports Piracy Monitor Hosted Solution eWaste Computing Infrastructure Frequently Asked Questions Tablets Worker Commute OneNote Notifications Professional Services Lifestyle Cast USB User YouTube Licensing Reputation Wearable Technology End of Support Tip of the week Samsung Tools Social Data Protection Twitter NarrowBand Print Server Customers Internet exploMicrosoft Windows Server 2008 Root Cause Analysis Crowdfunding Best Practice Social Networking Chromecast Comparison IT solutions Users Rootkit Video Games Audiobook Knowledge Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Keyboard Telecommuting Conferencing Windows 10s Smart Technology Battery Experience Remote Work Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Emails Books CrashOverride Mobile Device IBM Webinar Emergency Worker Content Supercomputer