Alltech IT Solutions Blog

Tip of the Week: Doing More With the Windows Key

Tip of the Week: Doing More With the Windows Key

First introduced in 1994 as only the second piece of hardware produced by Microsoft, a new keyboard that came with Windows 95 was where the Windows key first debuted. Now, the Windows key (also known as the “Win Key”) is an extremely useful tool for the user who is aware of its capabilities.

We wanted to briefly go over some of the shortcut combinations that make use of the Win Key so you can more effectively use your computer to the fullest.

Useful Shortcuts Featuring the Win Key

Since there are so many options, it only makes sense to arrange them in list format:

Basic Functions

  • Win Key - Pressing the Windows Key alone allows you to open and close the Start Menu
  • Win Key + Up - Maximize window
  • Win Key + Down - Minimize window
  • Win Key + Left - Orient window to left side of screen
  • Win Key + Right - Orient window to right side of screen
  • Win Key + Home - Minimize all but active window
  • Win Key + Shift + Left/Right - Move an open window/application from one monitor to another
  • Win Key + M - This will minimize all windows
    • WinKey + Shift + M - This will restore all minimized windows
  • Win Key + L - Lock your computer (this also allows you to switch users)

Taskbar Functions

  • WinKey + T - Cycle through the programs currently in your Taskbar
  • WinKey + Number - Start pinned Taskbar program that corresponds to the number
  • Shift + WinKey + Number - Opens a new instance of the corresponding Taskbar program

Desktop Functions

  • Win Key + Ctrl + D - Start a new virtual desktop
  • Win Key + Ctrl + Left/Right - Cycle through your available desktops
  • Win Key + Ctrl + F4 - Close the current desktop

This is a pretty condensed list of Win Key shortcuts, so don’t be afraid to seek out others if you’re looking for a specific function. One great resource? The team here at Alltech IT Solutions. Give us a call for assistance with any of your IT questions, or to discuss some of the IT solutions that we offer businesses. Call 954-628-3770 today.

This Year’s CES Was All About Surveillance Technol...
Use Digital Signage to Your Business’ Benefit
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 27 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Continuity Healthcare Education Fleet Management Connectivity Managed IT Services Windows 7 Environment Benchmarks Apple Employer Employee Relationship Quick Tips Patch Management HaaS Gadget Managing Stress Safety Innovation Alert Ransomware VoIP Printer Server Wireless Remote Monitoring Antivirus Security Cameras Tech Support Profitability Retail Spam Vendor Management File Sharing Firewall Blockchain Webcam eCommerce Reporting Training Technology Hard Disk Drive Politics HP Microsoft Office Telecommute Managed Service Windows 10 Unified Communications Specifications User Tips WhatsApp Business Management Cabling Customer Service Access Google The Internet of Things Company Culture Internet Office Social Network Bitcoin Telephony Help Desk Video WannaCry Phone System Budget IT budget Save Money IT Support Server Managed IT Services Smartphone Big Data Instagram Hackers Eliminating Downtime Yahoo Mobility Inventory Productivity Telecommuting Plug-In Tip of the week CrashOverride Vulnerabilities Amazon Phishing Distribution Productivity Shadow IT Payment Video Games Wi-Fi Bandwidth Managed IT Medical IT Telephone System Machine Learning Cybersecurity eWaste Lead Generation Downloads Multi-Factor Authentication Cost Management Twitter Automobile Batteries Customer Relationship Management Worker SSD Scams Database Value instant Messaging Spam Blocking Freedom of Information Autocorrect Money Security Gaming Console Automation Mobile Compliance User Tip GDPR Cloud Cleaning HIPAA Document Management Router PowerPoint News How To Data Backup Spotify Chrome OS Credit Cards Hybrid Cloud Dongle Wireless Charging Cybercrime Printing Mobile Office Current Events Television Co-Managed IT Malware Data loss Ink User Security Personal Information Insurance Recycling Display Voice over IP Conferencing Paperless Office Battery Edge Settings Network Security Multi-Factor Security National Security Government Vulnerability Electronic Health Records Emergency Information DDoS Cortana Laptop Gadgets Dark Data Internet of Things Wearables Memes IT Services Recovery Smart Technology Scheduling Microsoft Office 365 Browser e-waste Tablet Work/Life Balance Virtual Assistant Hosted Solution Cryptocurrency Employee-Employer Relationship Windows 10 Sports Health Employees Tip of the Week Business Intelligence Website Remote Monitoring and Management Microsoft Teams G Suite Risk Management disposal BYOD Hosted Solutions Proactive IT Thank You Business Websites Android Storage Hard Drive Update Paste Hacking Certification Profiles Taskbar IaaS Net Neutrality Google Drive Mobile Device Management Computer Botnet Entertainment Efficiency Workers Social Media Microsoft Files Financial Bring Your Own Device Apps Congratulations Password Wireless Internet Information Technology RAM Online Shopping Copy Hosted Desktop Holidays Physical Security Emoji Threats Processors Outlook Office Tips Synergy Voice over Internet Protocol Search Travel Two-factor Authentication Scalability Staffing Technology Tips VoIp Analytics Paper Human Resources Windows XP Data Breach OneNote Mobile Security Data Recovery BDR Collaboration Troubleshooting Computer Care Access Control Mobile Device Outsourced IT Saving Money Payment Cards Internet Explorer Backup Managed Service Provider Printers Disaster Recovery Email Error Data Live Streaming IT Support Regulation Excel Shortcut Cables Streaming Media Remote Computing Business Technology Virtualization Virtual Private Network Alerts Processor Millennials Marketing Privacy Authorization Small Business Dark Web Email Management Remote Control Best Practices Hiring/Firing Threat Unified Threat Management Network Staff Managed Services Provider Maintenance File Management Data Protection Word Movies Licensing Spyware Mobile Devices Users Avoiding Downtime Authentication Law Enforcement Samsung Chrome Virus Solid State Drive Network Attached Storage Digital Cloud Computing Office 365 Passwords Encryption Communications Telephone Systems iPhone Data Security Operating System IT Leadership Data Management Artificial Intelligence A.I. Server Management Backup and Disaster Recovery Touchscreen Computers WiFi Networking Analysis Holiday IT Management Humor Content Filtering Comparison Managed IT Service Windows Server 2008 R2 Sales Scam Remote Support Vendor Workplace Tips Tech Terms Gmail Miscellaneous Biometrics Business Computing Smartphones Software App Hard Drives Facebook Google Maps Upgrade Project Management Tech Term Updates Hardware VPN Windows SaaS Knowledge Hacker Applications E-Commerce Going Green Tactics Communication Employer-Employee Relationship Trends Printer Time Management