Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

The Windows operating system has quite a few shortcuts baked in, each offering a user quicker access to the utility they are seeking out. It may sound crazy, but using these keyboard shortcuts can actually eliminate the eight days the average employee accumulates every year by just moving their hand from their keyboard to their mouse. 

In the interest of helping you save some time, we’ve assembled some shortcuts to help speed up some of the tasks that take a little longer.

Rotate Screen

Okay, this one isn’t so much a task as it is a way to keep office pranksters from wasting too much of your staff’s valuable time. An easy prank to play on someone who left their workstation unlocked is to rotate their screen with a quick shortcut. In order to level the playing field, this can be undone with the same shortcut: Ctrl + Alt + Arrow Key

Use this shortcut responsibly!

Switch Between Open Windows

Sometimes, you find yourself losing the window you need behind all the others you’ve opened up. While you could hover over the corresponding application in the taskbar to find it, it is probably faster to use the Alt + Tab shortcut to cycle through a layover window that displays all of your open windows to select the appropriate one. This can also be a handy way to see what windows you still have open, letting you determine which ones can be closed.

Snap Windows

Windows allows users to leverage a split-screen functionality by snapping application windows to the edges of the screen, dividing it equally between them. While you could finagle with clicking and dragging the windows to the sides until they reshape the way you want, it is much easier to simply press Windows Key + Left/Right Arrow Key to accomplish the same thing. If you want to snap your Window to a specific corner, dividing your screen into quarters, press the Up/Down Arrow Key immediately after the Left/Right Arrow Key.

Once you’re ready to maximize a window again, Windows Key + Up Arrow Key will allow you to do so.

Quick Shut Down

Clicking through menus can be a pain - especially when you’re just trying to shut down, or log out, or something simple like that. Thanks to this Windows shortcut and the Quick Access Menu, however, there’s a much more convenient way.

By pressing the Windows Key + X and combining it with the following keys, you can accomplish quite a few very common processes:

U - Shut Down
I - Sign Out
R - Restart
H - Hibernate
S - Sleep

Create Your Own Desktop Keyboard Shortcut

Finally, if you have a particular folder or application you frequently utilize and you keep on your desktop, you can create a keyboard shortcut that allows you to access it quickly. Right click the icon on your desktop and select Properties. You should see an empty field labeled Shortcut key. Simply click to select the field and press your desired shortcut key. This will create your new shortcut: Ctrl + Alt + [whatever key you chose].

What other shortcuts do you frequently use? Share them in the comments, and subscribe to our blog for more tips, tricks, and technology best practices!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware IT Support Efficiency Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Microsoft Cybersecurity Small Business Workplace Strategy Communication Data Backup Smartphone Passwords Saving Money VoIP Business Management Android Smartphones Mobile Devices communications Backup Data Recovery Upgrade Managed Service Managed IT Services Browser Social Media Microsoft Office Disaster Recovery Windows Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Productivity Server Managed Service Provider Current Events Miscellaneous Remote Work Gadgets Outsourced IT Information Holiday Encryption AI Employee/Employer Relationship Spam Windows 10 Office Business Continuity Compliance Data Management Government Training Business Technology Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Mobile Office Data Security Two-factor Authentication Apps Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail Vendor Employer-Employee Relationship Office 365 Tip of the week Hacker Conferencing Avoiding Downtime Marketing How To BDR WiFi BYOD Computing Applications Information Technology Access Control Help Desk Analytics Office Tips Computers Augmented Reality Retail Storage Healthcare Password Website Bring Your Own Device Managed IT Services Operating System HIPAA Router Big Data Risk Management Virtual Private Network Health 2FA Monitoring Customer Service Excel IT Support Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Solutions Cybercrime Social Display Printer Paperless Office Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Outlook Video Conferencing Hacking Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Presentation Humor Wireless Technology Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Word Vulnerabilities Entertainment Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Safety Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Physical Security Integration Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage Customer Relationship Management LiFi Windows 8 Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Drones Shopping Competition SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Halloween Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider User Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Co-managed IT Superfish Bookmark IP Address Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Education Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Recovery Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Hard Drives Cyber security Domains Tablet IoT Communitications Search Dark Web Cables CES Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Refrigeration Buisness File Sharing Regulations Legal Data Analysis Public Speaking IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Lithium-ion battery Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Entrepreneur Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Undo Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta Username Application Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Google Docs IBM Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Media Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses

Blog Archive