Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

Is a Generation Gap Causing Workplace Issues?
Is a Data Backup Really That Necessary? In a Word:...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Malware Managed IT Services Disaster Recovery Microsoft VoIP Google Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 communications IT Support Computer Hardware Innovation Efficiency Android Cybercrime Ransomware Office Data Backup Alert IT Services Browser Telephone Systems Server Saving Money Business Management Windows Computers Small Business Social Engineering Chrome Upgrade User Tips Mobile Device Management Quick Tips Office Tips Smartphone Social Media Miscellaneous Passwords Workplace Tips App Firewall Save Money Virtualization Law Enforcement Managed IT How To Cybersecurity Network Data Recovery Cloud Computing Recovery Mobility BDR Work/Life Balance Avoiding Downtime BYOD Microsoft Office Hacking Collaboration Holiday Office 365 Bring Your Own Device Managed Service Provider Two-factor Authentication Budget Proactive IT Money Communication Password HaaS Bandwidth Flexibility Wi-Fi Information Technology Health Facebook Private Cloud Operating System Productivity Internet of Things Remote Monitoring Google Drive User Error Marketing Windows 10 Artificial Intelligence SaaS Value Automation Phishing Risk Management Spam Safety Employer-Employee Relationship Redundancy Router Compliance Managed IT Services Gadgets Gmail Data Breach Data Management Black Market Business Intelligence Identity Theft Solid State Drive Entertainment Downtime Cleaning Hiring/Firing Credit Cards Computer Care History IT Management Word OneNote Wearable Technology Samsung Best Practice Patch Management Data storage Shadow IT Business Owner Keyboard Government Scam End of Support Unsupported Software Internet Exlporer VPN Save Time The Internet of Things Data Security DDoS Spam Blocking Worker Automobile Apps Public Cloud Remote Computing Wireless Technology Meetings Wireless Battery Vulnerability Apple Mobile Device Content Filtering Computing Infrastructure Data Storage Workers Applications Physical Security Mobile Computing Settings Charger Networking Big Data Voice over Internet Protocol Video Games hacker Running Cable Knowledge Streaming Media Electronic Medical Records Users Windows Server 2008 Unified Communications Professional Services FENG Unified Threat Management IBM Books Multi-Factor Security Scalability Data Warehousing Network Congestion Windows 7 Theft Emails SharePoint Virtual Reality HIPAA Tools Encryption Supercomputer Emergency Trending Instant Messaging Going Green Regulations Cortana Robot Tech Support Employer Employee Relationship Fraud Worker Commute Notifications Relocation People IT Consultant Fax Server Current Events Lifestyle Search IT Plan Laptop Google Apps Computer Accessories Amazon Botnet Mobile Office IaaS Touchpad Leadership IT solutions Data Protection How to Servers Infrastructure Outlook Netflix Bluetooth Amazon Web Services Document Management Experience Travel Techology Root Cause Analysis YouTube Loyalty Transportation Comparison Internet exploMicrosoft Software Tips Flash Password Manager Humor Online Shopping Music iPhone Antivirus webinar Benefits Specifications Advertising Sync Monitor Sports Evernote Assessment USB Software as a Service Data loss NarrowBand Conferencing WiFi Smart Technology Millennials HBO Distributed Denial of Service Telephony Reputation Windows 10s Rootkit Television Troubleshooting Update Legal Files Screen Mirroring IT Support Workforce Hybrid Cloud Frequently Asked Questions Wireless Charging Content Skype Customer Training Public Computer Hosted Solution Google Docs Colocation Cast Chromecast Mouse Two Factor Authentication Telecommuting Education PDF Excel Fiber-Optic Audiobook Start Menu Audit eWaste Vendor Management Website Uninterrupted Power Supply Remote Work Tip of the week Cables Politics Mobile Lithium-ion battery Hard Drives Computer Fan Environment Administration Webinar IT solutions CrashOverride Business Mangement Recycling Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!