croom new

NuTech Services Blog

Tip of the Week: 5 Windows Tricks

Tip of the Week: 5 Windows Tricks

The Windows 10 operating system is the most common operating system for business use, which is what makes it surprising that so few know how to adjust its appearance to suit their preferences. For this week’s tip, we’ll go over a few ways to adjust what you’re seeing and/or looking at for maximum productivity.

Quicker Settings
Your settings are your greatest tool to control your Windows 10 preferences. If you need to change a setting on the fly, you can pull up the menu by pressing CTRL + I or Windows Key + I.

Zoom In/Out
Whether it’s a graphic you want a closer look at or text that’s just a smidge too small (or the opposite cases) the ability to zoom in or out on the entire screen can quickly become a handy trick to know. You have options here: you can either press CTRL + (+) or CTRL + (-) to zoom in or out, or press CTRL + Scroll Wheel to accomplish the same. Pressing CTRL + 0 will reset the screen to normal.

Changing Active Applications
If you’ve really got a good groove flowing as you work, pausing to switch windows with your mouse can really trip you up. With some practice, you can use a keyboard shortcut instead, eliminating this inconvenience. Holding Alt as you press Tab will bring up smaller versions of your active windows, and using the directional keys (while still holding Alt) will allow you to select a different one to work in.

Switching Monitors
Workplaces are seeing more and more multi-monitor setups in use. A shortcut makes it easy to move application windows around and across screens. To move a window to the other monitor, press Windows Key + Shift + Left/Right. Whether you choose left or right depends on which way you want your window to move.

You can use a simpler version of this shortcut to dock an application or browser window to the side of its current monitor, too. All you press for this one is Windows Key + Left/Right.

Shortcuts like these can turn you into a Windows power user in no time at all, with a little practice. Do you have a shortcut that you use frequently enough to make it second nature? Share it with us in the comments!

Are American Voting Systems Secure?
IT Support Scams are Everywhere. Here’s What You S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 16 June 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Microsoft Business Malware Internet User Tips Email Innovation Backup Efficiency Mobile Devices Workplace Tips Data Productivity Network Security Software Hardware Miscellaneous Productivity Windows 10 Android Browser Smartphones Smartphone VoIP Computer Business Continuity communications Network Small Business Tech Term IT Services Business Management Windows Server Disaster Recovery Office Chrome Ransomware Cloud Computing Communication Data Backup Holiday Cybercrime Social Media Upgrade Windows 10 Data Recovery IT Support Save Money Managed IT Services Computers Automation Gadgets Alert Outsourced IT Artificial Intelligence Managed IT Services Mobile Device Telephone Systems Microsoft Office Virtualization Internet of Things Router Quick Tips Collaboration Employer-Employee Relationship Hacking Cybersecurity Law Enforcement Facebook Social Engineering Health Passwords Office 365 App Operating System Spam Mobile Device Management Office Tips Password Applications How To Wi-Fi Marketing Mobility Information Phishing Users Money Bandwidth Saving Money Big Data Word Work/Life Balance Networking Bring Your Own Device Two-factor Authentication Encryption Government Mobile Computing Mouse Gmail Managed Service Provider Remote Computing Private Cloud BDR Website Remote Monitoring Application Settings Entertainment Google Drive BYOD Sports Staff USB Recovery Managed Service Education Vulnerability Data Breach Human Resources Paperless Office VPN Data Protection Scam Cleaning Meetings Connectivity IT Support History Data Security HaaS Voice over Internet Protocol WiFi Apps Virtual Reality Flexibility Lithium-ion battery Data Management Keyboard Wireless Safety Training The Internet of Things Patch Management Redundancy Retail Virtual Assistant Unsupported Software Unified Threat Management Excel End of Support Net Neutrality Display OneNote Comparison Humor Charger Update CES PDF Biometrics Telephone System Apple Black Market Identity Theft Hacker Managed IT Infrastructure Environment Robot Machine Learning YouTube DDoS Telephony Computer Care IT solutions Google Docs Content Management eWaste Botnet Data Storage Access Control Electronic Medical Records Worker Computer Accessories Business Intelligence Augmented Reality Software as a Service Samsung Budget Blockchain User Error Downtime Windows 7 Fraud Physical Security Best Practice Cryptocurrency IT Management Risk Management Save Time Spam Blocking Servers Firewall Social Value Internet Exlporer Bluetooth Wearable Technology Data storage Battery Avoiding Downtime Public Cloud IT Plan Hiring/Firing Fax Server Printer Automobile Legal Managing Stress Document Management Vendor Loyalty Trending Cabling webinar Frequently Asked Questions Running Cable Monitor Amazon Web Services Relocation Vendor Management Uninterrupted Power Supply Criminal Hybrid Cloud Experience Entrepreneur Business Technology Knowledge SharePoint Remote Work Addiction Search Engine Workers Printer Server Analyitcs Enterprise Content Management Google Search Screen Mirroring Mobile Office Hosted Computing Two Factor Authentication Social Networking Smart Tech Camera Employer Employee Relationship Computing Infrastructure Tablets SaaS Windows Media Player MSP Cables Conferencing Tip of the week Reputation Sync Online Shopping Bing Solid State Drive Music Biometric Security Network Congestion Software Tips Search Cache Internet exploMicrosoft Content Consultant Password Management Proactive IT IBM Cast Going Green FCC Inventory Video Games Notifications Virus Hard Drives Security Cameras Specifications Digital Signature Techology Transportation File Sharing Default App Emails Windows Server 2008 Customer Evernote Wireless Internet Help Desk Audit Tech Support PowerPoint Information Technology Troubleshooting User 5G IT Consultant Credit Cards How to Science Password Manager Advertising Audiobook Best Available NIST ISP Supercomputer Laptop Title II Scalability Customer Relationship Management Devices Warranty Maintenance Wireless Charging iPhone Memory Smartwatch Assessment Root Cause Analysis NarrowBand Accountants Benefits Distributed Denial of Service Skype Windows 8 Wire Computer Fan Shadow IT Books OLED Leadership HBO IT Infrastructure Travel Business Mangement Politics Cryptomining Touchpad Online Authentication Instant Messaging Customer Service Thought Leadership Administrator Rootkit Start Menu Cortana Cameras Files Worker Commute Employee Television Wireless Technology Millennials Remote Worker WIndows 7 Tablet Smart Office Shortcuts FENG Multi-Factor Security HIPAA Emergency Programming Manufacturing Outlook Flash Amazon Windows 10s Shortcut Recycling Analytics Bloatware Safe Mode Database Current Events Telecommuting Nanotechnology Microchip Tools Google Apps HVAC Digital Signage Public Computer Data loss People Chromecast Workforce Practices Smart Technology Wiring Netflix Streaming Media ROI Printers Phone System CrashOverride Compliance Company Culture Webinar Regulation IT solutions Investment Twitter

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events

Recent Comments

No comments yet.

Latest Blog Entry

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login