k_Street Consulting, LLC Blog

Tip of the Week: 5 Tricks to Using Windows

Tip of the Week: 5 Tricks to Using Windows

There’s a lot more to the Windows operating system than first meets the eye, especially where handy shortcuts are concerned. Today, we’ll cover five of the shortcuts baked into Windows that may be beneficial to your productivity.

Rename File
Every so often, you will discover that the name of a document isn’t entirely accurate anymore. Naturally, this file name should be changed to accurately reflect its contents. While you could right-click and select ‘rename’ for each one you have to change, it is much faster to simply select the file (or files) that needs a name change, and press F2. If you change the name of multiple files to the same thing, it will even automatically add the number to the end to differentiate them.

Active Window Screenshot
Screenshots can be very useful, but they can also be a pain to capture. Fortunately, there’s a way to easily take a screenshot of just the active window. By pressing Alt + Print Screen, the active window will be captured cleanly.

Problem Steps Recorder
Every so often, you may need to record your steps exactly, whether you’re replicating an issue for IT to check out or outlining a procedure for training purposes. Windows offers the Problem Steps Recorder, which is an easy-to-use action recording program that outlines and illustrates each step you take while the program is observing you. It then generates a step-by-step report to be reviewed. Creating one is especially simple - the hardest part is typing “psr” into the Windows search bar to pull up the program.

Easy Open Applications
The taskbar is extremely useful for storing your most-used programs and files for easy access. Windows has incorporated a shortcut that makes accessing them even easier. First, figure out which number your desired application is in sequence, then press the Windows key + the sequence number to open that application. This also works to maximize and minimize these windows.

Another way to quickly minimize and maximize your open windows is a little silly, but effective. If you want to minimize all but one of your windows, simply click and hold the window and shake it. All the rest will minimize. The same action will also reverse this, maximizing all of your windows again.

What other neat Windows tricks and shortcuts do you know about? Share them in the comments!

Getting a Better Sense of Customer Relationship Ma...
Is Email Actually More Trouble than It’s Worth?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, May 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Product Reviews Compliance Budget Android Data Storage Best Practices Gadgets Worker Office Internet Exlporer PDF Best Practice Analyitcs People Utility Computing Hackers Cabling Administrator Machine Learning Analytic Unified Threat Management Screen Mirroring Bluetooth Alert IT Solutions Cortana Applications Electronic Health Records MSP Nanotechnology Cryptomining Antivirus Passwords IaaS Audiobook Computer Fan Techology Storage Amazon Web Services Information Technology WiFi Hiring/Firing Tablets Insurance Chromecast History Operating System Mobile Device Management Cost Management Managing Stress Internet Consultant Telephony Distributed Denial of Service Lifestyle Benefits Sports Transportation Hosted Computing Leadership Technology Windows 10 Data Warehousing Employee/Employer Relationship Data Management Millennials Password Manager Online Currency Servers Tip of the week Cables Chrome Wireless Charging Password Video Games Computer Repair Recovery IT solutions Frequently Asked Questions Business Computing 5G Social Networking Shadow IT Smart Tech Regulations avoiding downtime HBO Operating Systems Outsourced IT Pain Points Save Money Facebook Amazon App Voice over Internet Protocol Touchpad Content Filtering Conferencing Content Business Intelligence Remote Worker Router FENG IT Plan DDoS BDR Relocation IT service Word Application eWaste Read User Error Tools CES Business Mangement Vendor Management Paperless Office Security Cameras Company Culture Science Line of Business Samsung Apple Wire Analysis Theft Automation Employer-Employee Relationship Touchscreen Windows Server 2008 Biometric Security Business Continuity Health Loyalty Small Business Biometrics Two-factor Authentication Google E-Commerce Miscellaneous Evernote Shortcut eCommerce Physical Security Business Management Document Management Windows 10s Webinar Training Social Microsoft Memory Microsoft Office Users Electronic Medical Records IT Services Database Computer Law Enforcement SharePoint Connectivity OneNote Quick Tips Domains Private Cloud Solid State Drive Phishing Fraud Network Congestion Accountants IBM Tip of the Week Vulnerability Unified Communications Remote Computing How To Administration Experience Best Available analytics Display OLED Staff Going Green Internet exploMicrosoft Multi-Factor Security Windows 7 Remote Work Data loss Customer Service NarrowBand Safe Mode Troubleshooting Telephone Systems Charger Windows 10 Mobile Computing Data IoT Multiple Versions Privacy Thought Leadership Blockchain Mobile Device Practices IT Management Flash HIPAA Hard Drives IT Consultant Mouse Networking File Sharing Students Mobile Office Google Search Patch Management Phone System Data Protection Credit Cards Hring/Firing Cybercrime Virtual Assistant End of Support Distribution Audit Manufacturing Infrastructure Enterprise Content Management Smartwatch Data Recovery Point of Sale Google Apps Save Time Downtime IT Support Gmail Streaming Media Network Security Workforce Statistics Entrepreneur Cache Congratulations Legal IT Support Firewall Strategy Hosted Solutions Notifications Virtual Desktop Running Cable malware Email Tech Term SaaS Root Cause Analysis Digital Signature Spam Blocking Sync Software Tips Entertainment USB Reputation Mobility Remote Monitoring Network Money Ransomware YouTube Laptop Settings Cleaning Default App Bandwidth Virus Computer Care Specifications Bloatware VPN Wearable Technology Monitor Communication Tablet Identity Theft Warranty Netflix Mobile Devices Backup and Disaster Recovery PowerPoint Marketing Trending WIndows 7 Public Cloud Uninterrupted Power Supply Printer Logistics Wiring Redundancy Efficiency Music Content Filter The Internet of Things Virtual Reality Intranet VoIP Cloud Content Management Fax Server Archive Encryption Vendor Productivity Workplace Tips Fiber-Optic Botnet Data storage Wi-Fi BYOD Two Factor Authentication Robot Twitter Recycling communications Authentication Skype Restore Data Net Neutrality Books Lithium-ion battery Humor Value HVAC Gaming Console Hacker Keyboard Managed Service Advertising Employee Customer Relationship Management LinkedIn Digital Payment Upgrade Rootkit Mobile Smart Technology Browser Telephone System Software Saving Time Augmented Reality Comparison Google Drive Automobile Business Technology Professional Services Criminal Windows ISP Backup Printers Wireless GDPR Education Black Market File Versioning Remote Monitoring and Maintenance Data Backup Smart Office Cast Smartphones Television Shortcuts Proactive IT Managed IT Help Desk Internet of Things Server Apps Knowledge Assessment Wireless Technology Devices Social Engineering Unsupported Software Thank You Computer Accessories Holiday webinar Search NIST CrashOverride Work/Life Balance Current Events Software as a Service Disaster Recovery Safety Emails Update Information Website Microchip Collaboration Files Artificial Intelligence iphone Google Docs Online Shopping Virtualization Bing Hybrid Cloud Customers Camera Managed IT Services Supercomputer Hosted Solution travel Colocation Office Tips Project Management Smartphone Access Control Government Scam Productivity Battery Outlook Windows Media Player Maintenance Managed IT Services User Tips Search Engine Computers Business Owner Social Media Workers Start Menu Telecommuting Managed Service Provider Retail Data Security Windows 8 Regulation Security Password Management Healthcare Meetings Environment Cybersecurity Virtual Private Network Cloud Computing Computing Infrastructure Excel Human Resources Public Computer User Politics Employer Employee Relationship Worker Commute Data Breach Digital Signage Office 365 Printer Server Inventory Instant Messaging Spam Addiction Flexibility Innovation Business Cryptocurrency Emergency Wireless Internet Saving Money Hacking Programming HaaS Hardware Cameras Big data Proactive Tech Support Bring Your Own Device Scalability Risk Management How to

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *