Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Your Computer to Its Full Potential

Tip of the Week: Using Your Computer to Its Full Potential

Your computer, and the many resources you use it to access, are made for utility. As a result, there is an assortment of useful features built into many commonly used systems and solutions. For this week’s tip, we’ll go over some of the shortcuts that you may not have known about.

For Windows
The Windows operating system itself comes with a few shortcuts that can make using your computer much more convenient.

A cluttered screen can be extremely distracting, but minimizing and maximizing each window each time you need a different one can add up to be a major time sink. Arguably even more so, it gets annoying pretty quickly. Windows provides a fix that sounds a little silly -- to quickly minimize every window other than the one you want to keep, click and hold the bar at the top (where the minimize, full screen, and close buttons are located) and shake your mouse. All other active windows will minimize. Repeating this action calls your windows back to your display.

  • You can also use your taskbar to accomplish a similar result. Pressing the Windows key and the number of the application on your taskbar will open it, and then can minimize and maximize it.
  • If you have a file selected and you need to rename it, pressing F2 will allow you to do so without right-clicking and selecting Rename from the options.
  • If you want to speed up deleting a sentence you just typed, pressing Ctrl as you hit backspace will delete your text word-by-word, instead of character-by-character.
  • Windows also makes it easier to take specific screenshots of your active window: all you have to do is press Alt and Print Screen.

For Chrome
Google Chrome is a highly utilizable browser, with plenty of shortcuts and features baked in.

  • We’ve all had those searches we regret, and Google never seems to let us forget about them--until now, that is. Using your arrow keys, select the unwelcome suggestion, and press Shift + Delete to eliminate it.
  • If you’ve ever wanted to move multiple tabs to a new browser window, you know how quickly the back-and-forth gets old. By holding Ctrl, you can select multiple tabs and drag them to an existing window or create an entirely new window.

For Any Browser
If you aren’t a Chrome user, there are still plenty of shortcuts that will work for any of the popular browsers.

  • Selecting text in a web page can be frustrating, as you can easily grab an unwanted chunk by drifting your mouse too far one way or another. This can be avoided by clicking in the text where you want to begin highlighting, then pressing Shift as you click on the end of your desired segment.
  • You can quickly access the address bar at any time by pressing F6, or Ctrl + L.
  • Once you’re done with one of your tabs, middle-clicking it will close it.

How many of these tips did you know about? Are there any you know of that we missed? Share them in the comments!

Is a Generation Gap Causing Workplace Issues?
Is a Data Backup Really That Necessary? In a Word:...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Disaster Recovery Mobile Devices Microsoft Productivity Software Email Business Continuity Business Internet Innovation Outsourced IT Data Data Backup Cybercrime Efficiency communications Ransomware Smartphones IT Support Windows 10 Computer Cloud Computing Data Recovery IT Services Browser Android Hardware Internet of Things Office BDR Telephone Systems Computers Server Windows Business Management Saving Money Alert Tech Term Upgrade Cybersecurity User Tips Mobile Device Management Small Business Smartphone Virtualization Network Quick Tips BYOD Managed IT Social Engineering Microsoft Office Collaboration Save Money Law Enforcement Chrome Workplace Tips Artificial Intelligence Private Cloud Password Bandwidth Hacking Communication Facebook Office Tips Managed Service Provider Mobility How To Work/Life Balance Router Avoiding Downtime Holiday Money Office 365 Productivity Social Media Miscellaneous Passwords Recovery App Firewall Budget VPN Two-factor Authentication Data Management Flexibility Wi-Fi Data Protection Bring Your Own Device Phishing Operating System Gmail Data Security Proactive IT Applications HaaS Automation Remote Monitoring Health Business Intelligence Information Technology Redundancy Value Windows 10 Risk Management Gadgets Document Management Word Employer-Employee Relationship Black Market Blockchain Google Drive Apps Cleaning Spam Compliance Mobile Device SaaS Data Breach User Error Marketing Vulnerability Entertainment Big Data Managed IT Services Safety Connectivity Identity Theft Samsung Remote Computing Wireless Technology Patch Management Windows 7 Business Owner Credit Cards Keyboard CES IT Management Scam PDF Smart Tech DDoS OneNote Computing Infrastructure Content Management IT Plan Save Time Physical Security Mobile Computing Unsupported Software Servers Worker Automobile Meetings USB Wireless Apple Comparison Downtime Legal eWaste Battery History Training Spam Blocking Data loss Best Practice Education Settings Access Control Data storage Shadow IT Government Infrastructure Update Streaming Media Content Filtering IT Support End of Support Charger Internet Exlporer Networking YouTube Encryption Electronic Medical Records Analysis Solid State Drive Website The Internet of Things Data Storage Hiring/Firing Wearable Technology Workers Computer Care Sports HIPAA Paperless Office Public Cloud Devices Reputation Wireless Charging Professional Services FENG IT solutions Network Congestion Search Students Files Criminal Multi-Factor Security Current Events Data Warehousing Computer Accessories Emails Safe Mode Hybrid Cloud IoT Thought Leadership Customer Fiber-Optic Tools How to Healthcare Colocation Trending Chromecast Regulations Bluetooth Antivirus File Sharing Fraud Content Filter Cables Loyalty Experience Techology IT Consultant Electronic Health Records Lifestyle Transportation Uninterrupted Power Supply Business Technology Insurance Amazon Storage Unified Communications Botnet Distributed Denial of Service Music WiFi Leadership Machine Learning hacker Benefits Netflix Virtual Assistant Practices Amazon Web Services Theft Travel Assessment Root Cause Analysis Human Resources Software Tips Smart Technology Flash Rootkit Telephone System Hosted Computing Online Shopping Addiction Cortana Television Mouse Troubleshooting webinar Staff Specifications Going Green Inventory Evernote Robot Sync Tech Support Content Cache Relocation Google Apps Software as a Service Public Computer Hosted Solution Lithium-ion battery HBO Two Factor Authentication Environment Conferencing HVAC Digital Signature Millennials Laptop Telephony Vendor Management Running Cable Windows 10s Audiobook Wireless Internet Screen Mirroring IaaS Frequently Asked Questions Enterprise Content Management Strategy Workforce Touchpad Authentication Outlook Skype Politics Hard Drives SharePoint Video Games Wire Password Manager Google Docs Cast Excel Users Password Management Internet exploMicrosoft Telecommuting Nanotechnology Humor Start Menu Unified Threat Management Audit Scalability Smart Office iPhone Business Mangement IBM Books Notifications Tip of the week Virtual Reality People NIST Advertising Accountants Remote Work Monitor Mobile Computer Fan Fax Server Knowledge Instant Messaging Recycling Voice over Internet Protocol Supercomputer NarrowBand Emergency Windows Server 2008 Employer Employee Relationship Worker Commute Mobile Office Cryptocurrency Webinar IT solutions CrashOverride Thank You Twitter Company Culture Administration Congratulations Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!