Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: The ABCs of Windows Shortcuts

Tip of the Week: The ABCs of Windows Shortcuts

Windows has no shortage of capabilities to offer its users, with many of these tools coming with an associated Windows shortcut. Since keeping track of all of them can be a challenge, we wanted to assemble a list of most of them for you. This blog will serve as that list, so make sure you add it to your browser’s favorites for quick reference!

Let’s get into it.

The ABCs of Windows Shortcuts

Naturally, almost every letter of the alphabet on the keyboard has a shortcut assigned to it:

  • WinKey + A opens your Action Center.
  • WinKey + B highlights your notification area.
  • WinKey + C launches Cortana in listening mode.
  • WinKey + D toggles Show Desktop and the previous state.
  • WinKey + E launches File Explorer in the Quick Access tab.
  • WinKey + F opens the Microsoft Feedback hub.
  • WinKey + G opens the Game Bar tools, if that’s how you spend your time at home.
  • WinKey + H opens the Dictation toolbar.
  • WinKey + I opens your Settings.
  • WinKey + K opens the Connect pane to connect to wireless displays and devices.
  • WinKey + L locks the device.
  • WinKey + M minimizes all open windows.
  • WinKey + O locks the device’s orientation on tablets and mobile devices.
  • WinKey + P opens the Project pane.
  • WinKey + Q opens Search.
  • WinKey + R displays the run dialog box.
  • WinKey + S launches Cortana in typing mode.
  • WinKey + T cycles through the apps on the taskbar.
  • WinKey + U launches the Ease of Access/Display Center to manage your screens.
  • WinKey + V opens your clipboard app to view things you have copied to your clipboard with Ctrl + C.
  • WinKey + X opens the advanced, Secret Start menu.

Adjusting Your Open Windows

Some of Windows’ shortcuts are designed to help the user arrange their display to the appearance that best suits their needs. For instance:

  • WinKey + Left/Right Arrow will take the active window and adjust it to fill the left or right side of the monitor it is displayed in. 
  • WinKey + Shift + Left/Right Arrow will move the active window over to another display.
  • WinKey + Up Arrow will maximize the active window. 
  • WinKey + Down Arrow will minimize the active window.

There are, of course, many more Windows shortcuts to take advantage of, as well as plenty of other tips to help make your workday more efficient. We often share them in this blog, so make sure you come back often to check in!

Patch Management and How It Can Save Your Business
Companies Need to Keep Their Vendors’ Security In ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 16 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Network Security Data Backup Privacy Cloud Hosted Solutions Internet IT Services Software Efficiency Business Data Recovery Email Managed IT Services Hackers Small Business User Tips Google Innovation Mobile Device Phishing Malware VoIp Communication Business Management Collaboration Hardware Outsourced IT Cybersecurity Workplace Tips Computer Upgrade Smartphone Backup Cloud Computing Android Tech Term Managed Service Mobile Devices Microsoft Quick Tips Business Continuity Windows 10 Disaster Recovery Communications Smartphones Covid-19 Ransomware Passwords Managed Service Provider Paperless Office Users Saving Money Remote Work Browser Network Encryption Data Management Wi-Fi Windows Artificial Intelligence Office 365 Server Business Technology BDR Internet of Things Remote Monitoring Managed IT Compliance Social Media Help Desk Microsoft Office Healthcare Government Document Management Windows 7 Vulnerability Holiday Save Money Remote Data Security Managed Services Automation Virtualization Facebook Applications Blockchain Scam Information Employer-Employee Relationship Miscellaneous Managed IT services Laptops Health Chrome Machine Learning Office Analytics Vendor Management Gadgets Bandwidth Avoiding Downtime Training Project Management Antivirus BYOD Wireless Two-factor Authentication Redundancy Infrastructure Processor Meetings Mobile Office Tip of the week Virtual Private Network Employees Information Technology IT Management Employee-Employer Relationship Website OneDrive Customer Relationship Management Patch Management Company Culture Apps WiFi Data Loss Regulations IoT Maintenance RMM Time Management Hard Drive Password VPN Proactive Software as a Service Net Neutrality Networking Storage Router Remote Worker Mobility HIPAA Files Access Control Co-Managed IT Remote Computing Payment Cards Server Management Computing Voice over Internet Protocol Display Electronic Health Records Instant Messaging Mobile Consulting Downtime Assessment Recycling Word Telephone Flexibility Mobile Security Data Breach Professional Services Customer Service Unified Communications Managed Services Provider Mobile Device Management Network Management Consultation Free Resource Remote Workers Vendor Gmail Alert The Internet of Things Data Storage Conferencing Images 101 Management Risk Management Big Data Cooperation Social Network Money Smart Devices File Sharing Current Events Authentication Spam Monitoring Unified Threat Management Search Tablet Utility Computing Dark Web Augmented Reality Remote Monitoring and Management File Management Bring Your Own Device Internet Exlporer Financial Holidays Operating System Smart Technology Hacker Lenovo Solid State Drives How To Test Outsource IT Modem High-Speed Internet Alerts Projects Private Cloud Tech Support Virtual Reality Samsung WPA3 Value of Managed Services Outsourcing Analysis G Suite Travel IT Consulting PowerPoint Procurement SharePoint Teamwork IT YouTube Cybercrime Cyber security Peripheral Smart Tech Firewall Bookmarks ROI Optimization CES Superfish Options Websites Laptop Development Comparison Licensing Mail Merge User Error Return on Investment Banking IT Technicians Cost Management Data Warehousing Fleet Tracking Zero-Day Threat Video Conferencing 2FA Motherboard Chromebook Technology Tips Cyberattacks Social Downloads Shared resources Going Green Business Telephone Videos Legislation Database Management PCI DSS Connectivity Distributed Denial of Service Personal Information Favorites Virtual Machines Migration eWaste 5G Mobile VoIP SaaS Remote Working Cookies Cables Specifications Address Settings Reviews Operations Manufacturing Asset Tracking Backup and Disaster Recovery Biometric Vulnerabilities Digital Payment Hotspot Virtual Assistant Bitcoin Read Only Security Cameras Managed IT Service MSP Batteries Finance IT Assessment Media Managing Stress Techology GDPR Point of Sale Tech Terms Touchscreen Hacking Transportation Active Directory Credit Cards Chatbots Wireless Internet Budget Nanotechnology Wires Black Friday End of Support Mirgation Human Error Heating/Cooling Gamification Mobile Computing Mouse Language Technology Laws Wasting Time Printing Break Fix Emergency Multi-Factor Security CIO applications Digitize Ergonomics Enterprise Content Management Outlook Disaster Resistance E-Commerce Theft Trending CRM Wearable Technology Star Wars Printer Windows Server Computers Customer Relationships Identity Theft Enterprise Resource Planning Permissions Employer/Employee Relationships Apple Electronic Medical Records Statistics App Cyber Monday Staff Windows Server 2008 Gifts Cache Microsoft Excel Hard Disk Drives OneNote Sensors Permission Servers Geography Computing Infrastructure Unified Threat Management Database Authorization Shadow IT Vendors Social Networking Shortcut Proactive IT Notes Features Content Filtering User Management Politics Recovery Innovations Identity Google Calendar Fraud Proactive Maintenance Solid State Drive Bluetooth Screen Reader Daniel Stevens Marketing Regulation Twitter Printers Education CEO Students

Latest Blog

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...