Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

Is a Generation Gap Causing Workplace Issues?
Is a Data Backup Really That Necessary? In a Word:...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Hackers Business Computing Network Security Backup Malware Managed IT Services Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Business Mobile Devices Business Continuity Email Outsourced IT Internet Productivity Data Innovation Efficiency Cybercrime Windows 10 Ransomware IT Support Smartphones communications Computer IT Services Hardware Browser Data Backup Android Office Cloud Computing Computers Server Telephone Systems Alert User Tips Mobile Device Management Windows Small Business Data Recovery Saving Money Smartphone Business Management Virtualization BDR Quick Tips BYOD Cybersecurity Social Engineering Internet of Things Chrome Upgrade Network Recovery Microsoft Office Private Cloud Managed IT How To Collaboration Hacking Holiday Mobility Work/Life Balance Social Media Office Tips Avoiding Downtime Miscellaneous Passwords Workplace Tips App Productivity Firewall Save Money Law Enforcement Budget Two-factor Authentication Health Facebook Information Technology Password Redundancy Communication Operating System Data Protection Gmail Flexibility Phishing Wi-Fi Data Management Office 365 Data Security Bring Your Own Device Managed Service Provider Proactive IT Money Remote Monitoring Business Intelligence VPN Bandwidth HaaS Artificial Intelligence Safety Tech Term Value Gadgets Spam Black Market Apps Router User Error Marketing Google Drive Compliance Cleaning Mobile Device Vulnerability Managed IT Services Data Breach SaaS Big Data Risk Management Identity Theft Automation Employer-Employee Relationship Windows 10 IT Management Samsung Patch Management Word OneNote Business Owner Meetings Keyboard IT Plan Public Cloud Wireless Scam Remote Computing Apple Wireless Technology Document Management Unsupported Software CES eWaste Save Time Comparison PDF Computing Infrastructure Worker Settings Automobile Spam Blocking Physical Security Mobile Computing Data loss Legal Entertainment Battery Update Encryption Training Downtime History Wearable Technology Content Filtering Applications Best Practice Data Storage Charger Data storage Shadow IT Workers Government Electronic Medical Records Solid State Drive End of Support Internet Exlporer Hiring/Firing HIPAA Computer Care DDoS Credit Cards The Internet of Things Trending Advertising Recycling Distributed Denial of Service Current Events Monitor WiFi Sports Search Fraud Regulations Computer Accessories Wireless Charging NarrowBand Lifestyle IT Consultant Criminal IoT Reputation How to Amazon Botnet Files Bluetooth Fiber-Optic Experience Techology Hybrid Cloud Leadership Loyalty Netflix Mouse Smart Tech Customer Transportation Amazon Web Services Servers Travel Root Cause Analysis Colocation Cables Chromecast Music Software Tips Content Management Insurance Benefits Online Shopping Flash Lithium-ion battery Environment Unified Communications USB Uninterrupted Power Supply Specifications webinar Running Cable Assessment Blockchain Streaming Media Practices Smart Technology Evernote Sync Software as a Service hacker Rootkit Theft Troubleshooting Millennials HBO Conferencing Television Human Resources Windows 10s Hosted Computing SharePoint Telephony Screen Mirroring Cortana Content Hosted Solution Workforce Frequently Asked Questions IT Support Public Computer Staff Inventory Two Factor Authentication Education Skype Google Docs Cast Notifications Vendor Management Google Apps Going Green People Audiobook Digital Signature Robot Fax Server Tech Support Telecommuting Excel Audit Access Control Relocation Start Menu Hard Drives Website Infrastructure Laptop Mobile Office Politics Networking Strategy IT solutions Video Games Remote Work Tip of the week Computer Fan Authentication Users IaaS Mobile Voice over Internet Protocol Knowledge Unified Threat Management Password Manager Touchpad IBM Analysis Outlook Books Scalability Windows Server 2008 Professional Services FENG YouTube Virtual Reality Multi-Factor Security Data Warehousing Internet exploMicrosoft Network Congestion Antivirus Business Mangement Emails Supercomputer Accountants Humor Emergency Instant Messaging Windows 7 Tools iPhone Employer Employee Relationship Worker Commute Webinar IT solutions Thank You CrashOverride Congratulations Administration Nanotechnology

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!