Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Tip of the Week: Our Favorite Lesser-known Keyboard Shortcuts

There is no denying that the keyboard shortcuts we use are handy. Of course, you have the old cut, copy, paste standbys, but there are others out there that are helpful as well. For this week’s tip, we wanted to pay attention to a few other shortcuts you may have a use for.

Open a New Browser/File Explorer Window

Ctrl + N

We’ve all been working on something online or in our files and suddenly wanted an entirely separate process going for our convenience. Think about how much easier it is to just click and drag a file than it is to navigate through your file system to move it. Opening a new window in either of these programs is as simple as pressing Ctrl + N.

Open a New Tab

Ctrl + T

Likewise, we’ve all been browsing and want to have a second page up for reference, but don’t always really need it to be displayed. Adding a new tab by pressing Ctrl + T with the browser open will help you accomplish this. Another way to do this is by clicking on a link with the middle mouse button.

Find Something in a Document or on a Web Page

Ctrl + F

Of course, when the time comes to refer to something in your other tab, it may not be the easiest thing to find. However, if you suddenly have difficulty locating a bit of text, pressing Ctrl + F will allow you to search within the page for matching verbiage.

Snipping Tool

Windows Key + Shift + S

Screenshots can be very useful things, but it isn’t always so obvious how to capture one… until now, that is. The Snipping tool is a handy way to take a screenshot, and all you have to do to activate it is hold Windows Key + Shift + S.

Force Quit

Ctrl + Shift + Esc

Sometimes, our applications crash, and we have little choice but to cut our losses. Force quit, activated by pressing Ctrl + Shift + Esc, allows us to force a problematic program to close. Keep in mind, you’ll lose any unsaved work.

Case Shift

Shift + F3

This one is a little fun. Let’s say that we wanted to type out a phrase in different cases, like title case and the like. Doing so is simply a matter of typing it out, highlighting it, and pressing Shift + F3 until you get the result you’re looking for.

  • PRESSING IT ONCE WILL SET IT TO ALL CAPS.
  • pressing it twice will set it to all lowercase.
  • Pressing It Three Times Will Set It To Title Case.

Hopefully, you find these shortcuts useful in one way or another. Are there any that we missed that you think deserve a mention? Leave your thoughts in the comments!

How Your Employees Could Be Scammed Right Now
What to Look For in Your Business’ Wi-Fi Router
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 05 August 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Network Security Hackers Google Malware Microsoft Data Innovation Smartphones User Tips Business Software Hardware Email Hosted Solutions Miscellaneous Communication Backup communications Workplace Tips Internet Computer Mobile Devices Android Small Business VoIP Smartphone Cybersecurity Productivity Business Management Ransomware IT Support Outsourced IT Social Media Upgrade Mobile Device Windows 10 Windows Network Managed IT Services Browser Collaboration Tech Term Users Passwords Microsoft Office Holiday Apps Automation IT Services Cloud Computing Bandwidth Save Money Windows 10 Business Continuity Employer-Employee Relationship Phishing Office Managed IT Services Facebook Quick Tips Internet of Things Marketing Chrome Data Backup Gadgets Wi-Fi IT Support Disaster Recovery Wireless Saving Money Mobile Device Management Networking Gmail Managed Service Server Data Recovery Router Alert Information Password Apple Health Applications VPN Business Intelligence Data Breach Managed Service Provider Computers App Office Tips Hacking Virtualization Remote Computing Access Control Settings Retail Mobility Law Enforcement Covid-19 Blockchain Patch Management iPhone Office 365 BDR Remote Monitoring Recovery Analytics BYOD Excel Application Going Green Twitter Laptop Physical Security Website Data Management Operating System Cybercrime Government Telephone Systems Politics Biometrics Humor Mobile Computing Voice over Internet Protocol Conferencing History Mouse Value Artificial Intelligence Word Battery Remote Work Entertainment WiFi Bring Your Own Device VoIP Big Data Environment Managed IT Service Maintenance Virus Google Drive Lithium-ion battery Social Engineering Safety Workers Compliance Spam Paperless Office Printer Human Resources Information Technology Cleaning Telephone System Medical IT Printer Server Meetings DDoS Wireless Charging Robot Dark Web Connectivity Scam Managing Stress Tech Support IT solutions Hard Drives Smart Technology Batteries Customer Relationship Management Tip of the week Shadow IT Content Filtering Files Risk Management Virtual Assistant Customer Service Internet Exlporer Data storage Data Protection End of Support Streaming Media Payment Cards Fax Server How To Current Events Tech Terms The Internet of Things Search Two-factor Authentication Hosted Solution Social Network Windows 7 Education Remote Monitoring and Management Business Technology eWaste Vulnerability RAM Cortana User Error Telephony PowerPoint Best Practice Virtual Reality HIPAA Employee-Employer Relationship Processor Hybrid Cloud Shortcut Healthcare Tablet Company Culture Sports Cost Management Data Security G Suite Net Neutrality Mobile Office Remote Workers Benchmarks Online Shopping Social Networking Outlook Ink WIndows 7 Black Market Edge Unified Threat Management E-Commerce Tablets Cables Specifications Paste Webcam Websites Co-Managed IT Solid State Drive YouTube Recycling Windows Media Player Profitability Alerts Payment Worker GDPR disposal Dongle Memes Hard Disk Drive Management Distributed Denial of Service NarrowBand Lead Generation Eliminating Downtime Downloads Hiring/Firing Work/Life Balance Downtime IT budget File Management Budget instant Messaging Remote Support Memory Video Storage Remote Control Avoiding Downtime IT Remote Working Wireless Technology Bitcoin Wireless Internet Trends Automobile Amazon Staffing Phone System IT Management Managed Services Provider Vulnerabilities OneNote User Tip Programming Error Spam Blocking User Technology Tips Hosted Desktop Chromecast WannaCry Help Desk A.I. Plug-In Access Monitor Vendor Cryptocurrency File Sharing Windows Server 2008 R2 Telecommuting Touchscreen Email Management Database Internet exploMicrosoft Backup and Disaster Recovery Firewall SharePoint Techology PCI DSS Encryption Threats Hard Drive Certification Movies Antivirus Proactive IT Printers Reputation Network Attached Storage User Security Analyitcs Taskbar Millennials Microsoft Office 365 Tactics Google Maps Bluetooth Advertising SSD Profiles HaaS Regulations Compliance Notifications Scams Processors Training Licensing Hacker Unified Communications Gadget Spotify Customer Server Management Distribution Time Management National Security Authentication Internet Explorer USB Private Cloud Inventory Computer Repair Flexibility Project Management Spyware Security Cameras Travel Science Personal Information Analysis Cabling Machine Learning Fleet Management Chrome OS Updates Authorization Threat Botnet Public Cloud Mobile Security IT Service Legal Touchpad Insurance HP Wearables Live Streaming Windows 8 Microsoft Teams SaaS Consultant Telecommute Computer Accessories Multi-Factor Authentication Sales Mobile Wearable Technology Voice over IP Social Troubleshooting Multi-Factor Security Printing Managed IT e-waste Document Management WhatsApp Bloatware Windows XP Best Available Relocation Data loss Cameras Holidays People Electronic Health Records Knowledge Remote Running Cable Display eCommerce Update Paper PDF Video Games Uninterrupted Power Supply Digital News Entrepreneur Reporting Copy Staff Virtual Private Network Employees Comparison