Infracore LLC Blog

Tip of the Week: 5 Windows Tricks

Tip of the Week: 5 Windows Tricks

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!

Are American Voting Systems Secure?
IT Support Scams are Everywhere. Here’s What You S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business computing Google Malware Hosted Solutions Hackers Microsoft Software Innovation Data Hardware Business Internet Smartphones User Tips Backup Tech Term Data Backup Business Continuity Email Browser Windows 10 VoIP Computer Mobile Devices Android Outsourced IT Small Business Data Recovery Managed IT Services Smartphone Alert Workplace Tips Communications Business Management IT Services Cloud Computing Productivity Disaster Recovery Ransomware Miscellaneous Managed IT Services Office Efficiency Chrome Computers Law Enforcement Cybercrime Communication Network Artificial Intelligence Office 365 IT Support Password Applications Telephone Systems Facebook Virtualization Productivity Windows Internet of Things Money Passwords Collaboration Cybersecurity Windows 10 Social Media How To Router Google Drive Saving Money Quick Tips Word Upgrade Information Holiday Health Spam Work/Life Balance Server Social Engineering Gadgets App Microsoft Office Two-factor Authentication Hacking Automation Phishing Wi-Fi Data Security Bring Your Own Device Connectivity Save Money Mobile Device Keyboard Vulnerability BDR Apps Managed Service HaaS Office Tips Data Protection Private Cloud Scam Data Breach Mobile Device Management Voice over Internet Protocol IT Support Spam Blocking Business Intelligence Public Cloud Avoiding Downtime Blockchain Flexibility Update Samsung Identity Theft Electronic Medical Records IT Plan Training Operating System Encryption Bandwidth Infrastructure Legal Entertainment End of Support Mobility Automobile History Servers USB Value Unsupported Software Paperless Office VPN Firewall Networking Remote Monitoring Human Resources Managed IT Data Management Google Docs Telephony Fraud Employer-Employee Relationship Charger Windows 7 PDF Settings Comparison Marketing Virtual Assistant Patch Management BYOD Website CES Cleaning Battery Managed Service Provider Data Storage Sports Worker Government Telephone System Content Management Big Data OneNote Remote Computing Software as a Service Computer Care Redundancy IT Management Smart Office Administrator Politics Rootkit Excel Digital Signature Black Market Transportation Safety Workers Addiction Employer Employee Relationship IT solutions Physical Security Humor Internet Exlporer NIST Books Assessment Tools Online Shopping Smart Tech Camera eWaste Scalability Files Shortcuts Wearable Technology Computer Fan Sync Hosted Computing Computing Infrastructure Augmented Reality IT Consultant Data storage Document Management Microchip Tip of the week Millennials Hybrid Cloud Benefits Data loss Cache Computer Accessories Multi-Factor Security HIPAA Wireless Cryptocurrency Television Downtime Evernote WiFi Criminal The Internet of Things Credit Cards Inventory Remote Worker Leadership webinar Best Practice Search Engine Vendor Management Windows 10s Windows Server 2008 Workforce Apple Screen Mirroring Password Manager Wireless Internet Warranty Bluetooth HBO Trending Internet exploMicrosoft Safe Mode Emergency Public Computer Root Cause Analysis Wireless Charging Devices Software Tips Information Technology HVAC Troubleshooting Loyalty FENG Access Control Techology Users Wiring Save Time Conferencing Content Machine Learning Bing Accountants iPhone Smart Technology Current Events Cast Business Mangement Wire Printer Outlook Staff Search Advertising Botnet Cortana Thought Leadership Emails Instant Messaging Relocation User Error Enterprise Content Management SaaS Skype Amazon Authentication Virtual Reality Unified Threat Management Gmail Video Games Audiobook YouTube Help Desk Experience Solid State Drive Flash Telecommuting MSP Two Factor Authentication Knowledge Monitor Mouse Risk Management Frequently Asked Questions Specifications How to Meetings Travel Google Apps Password Management Start Menu Amazon Web Services Nanotechnology Worker Commute Mobile Computing Hiring/Firing Recovery Recycling Music Audit Remote Work Practices Education File Sharing Network Congestion Compliance CrashOverride Managing Stress Regulation Printers Thank You Congratulations Twitter Webinar Company Culture

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...
Alex Ling Would Your Users be Tricked by Social Engineering?
27 November 2018
I came to know about the user that was tricked by the users in this community this was all on social...
Daniel Mcmahon Ancient Greek Computer in Serious Need of Firmware Update
23 November 2018
Computers which are imported from the Greek now want to update the all software that is firmware tra...
Cameran Moon Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
22 November 2018
Infra core was the heart of IT they told us that if we download a wrong application it will infect o...