Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Change the Size of Your Desktop Icons

b2ap3_thumbnail_desktop_icons_400.jpgThere seem to be thousands of different ways a user can customize their desktop experience. Almost every nook and cranny of a system can be adjusted, even right down to the icons on your desktop. For this week’s tip, we’ll show you how to adjust the size of your desktop icons.

“Change the size of my desktop icons, why would I want to do that?” We’re glad you asked. This isn’t a well-known tip, and it’s not as personal of an adjustment to make as say, changing your desktop wallpaper image, but it can come in handy. Here are three examples:

  • Your eyesight isn’t good and you need to enlarge the icons to see them better.
  • Your desktop is too cluttered and you need to make some quick space by making every icon smaller (this isn’t a best practice).
  • Or, you need to pull a quick prank on a co-worker who has just stepped away from their PC and left it unlocked by quickly changing the size of every desktop icon.

Here’s how you do it: Simply left click the desktop to activate it and then, while holding down the [Ctrl] Key, move your mouse scroll wheel forward or backward in order to make the desktop icons larger or smaller. Go ahead and try it. You will notice that doing this simultaneously adjusts the size of every one of your icons, and it gives you a generous range of sizes to choose from.

Alternatively, you can adjust the icon sizes by right clicking the desktop, going to view, and then selecting Large icons, Medium icons, or Small icons.

resize desktop icons

After messing with the sizes of your desktop icons, using this desktop menu is an easy way to return the desktop icons to their normal size. To do this, select “Medium icons.”

What’s your preferred desktop icon size? Are you going to sneakily change the size of every desktop icon in the office and earn the title of Prank Master? Do know any other cool ways to customize your desktop? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Small Business Cybersecurity Workplace Strategy Microsoft Data Backup Passwords Communication Smartphone Backup Saving Money Business Management Android Smartphones VoIP communications Mobile Devices Upgrade Disaster Recovery Browser Managed Service Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Facebook Automation Productivity Artificial Intelligence Current Events Cloud Computing Covid-19 Remote Work Miscellaneous Gadgets Server Managed Service Provider Information Holiday Outsourced IT Employee/Employer Relationship Spam Encryption AI Windows 10 Training Office Business Continuity Compliance Data Management Government Wi-Fi Virtualization Business Technology Bandwidth Windows 10 Blockchain Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail BYOD WiFi Computing Applications Information Technology Access Control Office 365 Tip of the week Hacker Conferencing Avoiding Downtime Marketing How To BDR Operating System HIPAA Router Big Data Virtual Private Network Risk Management Health Help Desk Analytics Office Tips IT Support Augmented Reality Computers Retail Storage Password Healthcare Website Bring Your Own Device Managed IT Services Vendor Management Solutions The Internet of Things Cybercrime Social Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Content Filtering IT Management VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Customer Relationship Management Data storage LiFi Data Storage Smart Technology Supply Chain Video Conferencing Outlook Machine Learning Managed Services Provider Hacking Professional Services Presentation Money Saving Time Virtual Machines Humor Managed IT Service Wireless Technology Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Word Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Safety Printing Wireless Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Application Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT IBM Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor Displays Competition Drones Shopping Nanotechnology Optimization PowerPoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Fun Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care IP Address Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Recovery Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Hard Drives Search Dark Web Cables Domains CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Refrigeration How To Microsoft Excel IT Maintenance Public Speaking Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Lithium-ion battery Entrepreneur Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Undo

Blog Archive