k_Street Consulting, LLC Blog

Tip of the Week: 5 Windows Tricks

Tip of the Week: 5 Windows Tricks

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!

Are American Voting Systems Secure?
IT Support Scams are Everywhere. Here’s What You S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, May 27 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IaaS Scalability Meetings Two-factor Authentication Virtual Desktop Default App Excel Google Drive Saving Time Remote Computing Intranet Printer Administrator Video Games Books The Internet of Things User Tips Cortana Worker Computer Repair Product Reviews Insurance Apps Smartwatch Touchscreen Mobile Office Analyitcs Hacker Database Data Employee/Employer Relationship Information Technology Applications Sports Cloud Computing Touchpad Worker Commute Environment Bluetooth Education Automobile Security Cameras Transportation Business Technology Unsupported Software IT solutions Users Quick Tips Unified Communications Server Windows 7 Shortcuts Project Management Going Green Consultant Router Hosted Solution Business Intelligence Criminal Windows 10 Data Management Business Computing Budget Nanotechnology Chrome Data loss Shortcut Microsoft Office Spam Internet of Things Monitor Public Computer Connectivity Smart Tech Strategy eCommerce Phone System Remote Worker Telephony Utility Computing Blockchain Google Docs Emails Devices Internet Exlporer Hybrid Cloud Skype Cache Evernote Best Practice Comparison Streaming Media Cybercrime Tip of the Week Logistics WIndows 7 Recovery Techology Password Manager Business Owner Thank You communications Network Social Networking Recycling Biometric Security Authentication Domains Android travel Point of Sale Root Cause Analysis Students malware Digital Payment Settings Office Tips Firewall Statistics Small Business App Net Neutrality User Apple Vendor Workplace Tips Cables Content Downtime Scam Wi-Fi Experience Automation Smartphones Managing Stress Wireless iphone Hacking Loyalty Twitter Windows Redundancy Passwords Rootkit Running Cable Website Chromecast Current Events Alert Office Pain Points Leadership Smartphone Retail Data Security Specifications Facebook Cybersecurity Healthcare Computing Infrastructure Training Innovation Screen Mirroring Health Gmail Content Filter Technology Trending Troubleshooting Data Breach Botnet IBM Vendor Management Flexibility Communication USB Outlook Enterprise Content Management Data storage Analytic Regulations Cast Analysis Networking Maintenance Hardware Windows 10s Virtual Private Network HBO OLED MSP Productivity Proactive Electronic Health Records Employer Employee Relationship Black Market Staff Identity Theft Hring/Firing Gadgets Bring Your Own Device IoT Managed Service Managed Service Provider Conferencing Congratulations Hard Drives Google Apps Machine Learning Sync IT Solutions Proactive IT Mobile Device Virtualization Private Cloud Best Available Password Information Gaming Console Operating System avoiding downtime Files E-Commerce Entertainment Printer Server Telecommuting Help Desk Inventory Tech Support Marketing Disaster Recovery Hosted Computing Network Congestion Search Engine History IT Support Business Management Work/Life Balance Access Control Tablet SaaS Microsoft OneNote How to Government Shadow IT HaaS Antivirus Mouse Distribution YouTube Printers Safe Mode Legal User Error Internet exploMicrosoft Money Virus Credit Cards Best Practices Amazon Office 365 Password Management Social HIPAA Remote Monitoring and Maintenance People Risk Management SharePoint Outsourced IT Samsung IT Support Social Engineering Security Memory Search Remote Monitoring HVAC Cameras Wearable Technology Uninterrupted Power Supply Start Menu Google Search Backup and Disaster Recovery Save Money Encryption Science Workforce PDF Online Shopping Display Social Media Customers Relocation BDR Customer Service Servers Webinar Company Culture Accountants Business Public Cloud Virtual Reality VPN Collaboration Privacy IT service FENG Television Programming Storage Ransomware Tablets Mobile Computing Vulnerability Practices Advertising Fiber-Optic Data Protection PowerPoint Computer Fan Computers Big data Warranty Entrepreneur Audiobook Internet 5G How To Tools Spam Blocking Computer Cost Management Application Distributed Denial of Service Google Solid State Drive Mobile Devices Employee Charger Thought Leadership Law Enforcement Paperless Office Administration Restore Data CrashOverride Regulation Business Mangement Telephone System Email Two Factor Authentication Patch Management Wireless Technology Content Management Cryptomining File Sharing Infrastructure Upgrade Browser Battery Managed IT Services Frequently Asked Questions DDoS Data Warehousing Human Resources IT Plan Mobile Device Management Bing Employer-Employee Relationship Professional Services Computer Care Biometrics Knowledge Windows 10 Saving Money Multi-Factor Security Smart Office Customer Relationship Management Operating Systems Music Lifestyle Value Cabling Unified Threat Management Cloud analytics Telephone Systems Smart Technology IT Services Productivity Document Management GDPR Compliance Voice over Internet Protocol Business Continuity Update NarrowBand Lithium-ion battery ISP Theft Workers Microchip Laptop Camera Virtual Assistant Physical Security Keyboard Mobile End of Support eWaste Audit Fax Server Mobility Netflix Tip of the week Millennials NIST Efficiency Flash Assessment Phishing IT Management WiFi Supercomputer Software Tips Benefits Line of Business Content Filtering Holiday Politics Bloatware Wiring Miscellaneous LinkedIn Software Augmented Reality Windows Server 2008 Bandwidth VoIP Colocation Manufacturing Word Save Time Cleaning Archive Emergency Electronic Medical Records webinar Managed IT Safety Artificial Intelligence File Versioning Computer Accessories Multiple Versions Notifications IT Consultant Data Recovery Hosted Solutions Addiction Software as a Service Tech Term Hackers Wireless Internet Cryptocurrency Read Managed IT Services Online Currency Fraud Data Backup Wire Data Storage Backup CES Hiring/Firing Network Security BYOD Digital Signage Instant Messaging Remote Work Digital Signature Robot Windows 8 Windows Media Player Wireless Charging Humor Amazon Web Services Reputation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *