DatCom Blog

Tip of the Week: 5 Windows Tricks

Tip of the Week: 5 Windows Tricks

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!

Are American Voting Systems Secure?
IT Support Scams are Everywhere. Here’s What You S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Microsoft Hackers Business Computing User Tips Hosted Solutions Software Malware Tech Term Google Internet Business Data Backup Innovation Backup Hardware Data Email Smartphones Mobile Devices Small Business Communications Business Continuity VoIP Android Data Recovery Workplace Tips Ransomware Smartphone Computer Managed IT Services Cloud Computing Network IT Services Cybersecurity Communication Browser Chrome Alert Outsourced IT Law Enforcement Cybercrime Windows 10 Disaster Recovery Productivity How To Artificial Intelligence Applications Server Router Business Management Office 365 Internet of Things Efficiency Money Collaboration IT Support Computers Windows 10 Windows Password Miscellaneous Facebook Information Passwords Virtualization Word Gadgets BDR Spam Saving Money Social Media Managed IT Services Telephone Systems Productivity Work/Life Balance Keyboard Phishing Office Microsoft Office BYOD Connectivity Voice over Internet Protocol Mobile Device Save Money Holiday Managed Service Data Security Flexibility Apps Operating System Two-factor Authentication Mobility Government App Data Protection Vulnerability Avoiding Downtime Social Engineering Wi-Fi Mobile Device Management Quick Tips Redundancy HaaS Employer-Employee Relationship IT Management Health Comparison Blockchain Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Paperless Office Encryption Private Cloud Google Drive Human Resources End of Support Spam Blocking Upgrade VPN Virtual Assistant Public Cloud IT Plan Office Tips Business Intelligence Remote Computing Fraud Managed IT Bring Your Own Device Update Telephone System Telephony Unsupported Software CES Windows 7 Data Breach Software as a Service Sports Data Storage Content Management Data Management Bandwidth Google Docs Legal Settings OneNote Audit Advertising Online Shopping Smart Tech Current Events Addiction USB Samsung Video Games Cryptocurrency Internet Exlporer Hosted Computing Recovery Remote Worker eWaste Best Practice Excel Instant Messaging Tools History Search Engine Physical Security Apple FCC Big Data Computer Fan Sync Evernote Electronic Medical Records IT Support Cache Warranty Specifications Value Safe Mode Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Tip of the week Downtime Marketing Password Manager HIPAA Virtual Reality Machine Learning Bing Netflix iPhone Techology Title II The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Internet exploMicrosoft Access Control Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Cleaning Hacking Enterprise Content Management Windows 10s Windows Server 2008 Accountants MSP Root Cause Analysis Botnet Wireless Business Mangement Budget Worker Commute YouTube Help Desk HBO Online FENG Users Hybrid Cloud Cortana Hiring/Firing Battery Wire Mouse Conferencing Millennials Scalability Amazon Authentication Black Market Thought Leadership Mobile Computing IT Consultant Cast Multi-Factor Security Music Computer Care Automobile Password Management Telecommuting Search File Sharing WiFi Gmail Company Culture Outlook Skype Information Technology Travel Google Apps Risk Management Education Administrator Emails Software Tips Workforce Digital Signature Firewall Content Flash Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology NIST Solid State Drive Automation Remote Work Practices Patch Management How to Augmented Reality Meetings Recycling Training Document Management Managing Stress Shortcuts Frequently Asked Questions Audiobook Start Menu Workers Politics Computing Infrastructure Smart Office Microchip Net Neutrality PDF Printers Vendor Management Save Time Television CrashOverride Bluetooth IT solutions Troubleshooting Transportation Shadow IT Books Public Computer Safety Loyalty Benefits Wireless Technology Worker Managed Service Provider Hosted Solution SaaS Smart Technology Emergency Rootkit Business Owner Compliance Employer Employee Relationship Two Factor Authentication Twitter Regulation Computer Accessories Webinar Content Filtering Assessment