Alltech IT Solutions Blog

Tip of the Week: Doing More With the Windows Key

Tip of the Week: Doing More With the Windows Key

First introduced in 1994 as only the second piece of hardware produced by Microsoft, a new keyboard that came with Windows 95 was where the Windows key first debuted. Now, the Windows key (also known as the “Win Key”) is an extremely useful tool for the user who is aware of its capabilities.

We wanted to briefly go over some of the shortcut combinations that make use of the Win Key so you can more effectively use your computer to the fullest.

Useful Shortcuts Featuring the Win Key

Since there are so many options, it only makes sense to arrange them in list format:

Basic Functions

  • Win Key - Pressing the Windows Key alone allows you to open and close the Start Menu
  • Win Key + Up - Maximize window
  • Win Key + Down - Minimize window
  • Win Key + Left - Orient window to left side of screen
  • Win Key + Right - Orient window to right side of screen
  • Win Key + Home - Minimize all but active window
  • Win Key + Shift + Left/Right - Move an open window/application from one monitor to another
  • Win Key + M - This will minimize all windows
    • WinKey + Shift + M - This will restore all minimized windows
  • Win Key + L - Lock your computer (this also allows you to switch users)

Taskbar Functions

  • WinKey + T - Cycle through the programs currently in your Taskbar
  • WinKey + Number - Start pinned Taskbar program that corresponds to the number
  • Shift + WinKey + Number - Opens a new instance of the corresponding Taskbar program

Desktop Functions

  • Win Key + Ctrl + D - Start a new virtual desktop
  • Win Key + Ctrl + Left/Right - Cycle through your available desktops
  • Win Key + Ctrl + F4 - Close the current desktop

This is a pretty condensed list of Win Key shortcuts, so don’t be afraid to seek out others if you’re looking for a specific function. One great resource? The team here at Alltech IT Solutions. Give us a call for assistance with any of your IT questions, or to discuss some of the IT solutions that we offer businesses. Call 954-628-3770 today.

This Year’s CES Was All About Surveillance Technol...
Use Digital Signage to Your Business’ Benefit


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 15 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Telephony Connectivity Recycling Time Management Data Breach Data Protection Hiring/Firing Shortcut Politics Emoji Printers Workers VoIP Content Filtering Yahoo Smart Technology Managed Services Provider Network Security Thank You IT Services Healthcare Big Data RAM Amazon Data Management Television Efficiency Outsourced IT Hosted Solution Apps Small Business Automobile WhatsApp Tech Term Browser Processors Android Human Resources Autocorrect Managed IT IaaS Conferencing BDR Analytics Two-factor Authentication Business Technology Vendor Management Multi-Factor Authentication Certification SSD Company Culture Spam Managed IT Services Profiles Threats Scam Authorization Windows 7 Managed IT Services Entertainment Search Laptop Bitcoin Mobile Devices Paste Telephone System Troubleshooting Cybercrime Gadget Staffing IT budget Phishing Network Fleet Management Recovery Employer Employee Relationship Physical Security Going Green Spotify Proactive IT Cloud Wi-Fi Emergency Payment PowerPoint Cost Management Data Recovery Electronic Health Records WannaCry CrashOverride eWaste Retail Virtual Assistant Software Website Law Enforcement OneNote Touchscreen Hackers iPhone Humor Taskbar Settings Password Mobile Security Windows 10 Managed Service Provider National Security Vulnerability VoIp GDPR IT Hybrid Cloud Save Money Remote Working Instagram Outlook A.I. Smartphones Business Distribution Privacy Paper instant Messaging Microsoft Office Vulnerabilities Networking E-Commerce Scheduling Cortana WiFi Multi-Factor Security Mobile Remote Work Sports Voice over IP Remote Computing Hacker Google Telephone Systems Information Gadgets Document Management Managing Stress Virtual Private Network Net Neutrality IT Support Travel IT Management Hard Drives User Tip Updates Communication Social Network Windows Server 2008 R2 Benchmarks Display Office Word Spam Blocking The Internet of Things Managed Service Help Desk Live Streaming Authentication PCI DSS Office 365 Twitter Data Backup Vendor Encryption Cables Remote Monitoring DDoS Co-Managed IT Hardware Phone System Antivirus Mobile Device Management Best Practices Freedom of Information eCommerce Insurance Sales Unified Threat Management Wireless Charging Email Management Credit Cards Printing Access Control Voice over Internet Protocol Gmail Work/Life Balance Remote Control Ink Online Shopping Mobile Device Scalability Telecommuting Trends Internet Explorer SaaS Technology Licensing Cloud Computing Virtualization User Tips Battery Information Technology Security Communications Miscellaneous Solid State Drive Avoiding Downtime Alerts Biometrics Virus Inventory Medical IT Webcam Gaming Console Compliance Holiday Workplace Tips Mobile Office Server Websites Google Maps Operating System HP Environment How To Value Network Attached Storage Copy Security Cameras Meetings e-waste Dark Data Comparison Video Games Video Database Machine Learning G Suite Facebook Cybersecurity Backup and Disaster Recovery Disaster Recovery Error Payment Cards Paperless Office Marketing disposal Patch Management Windows XP Technology Tips Collaboration Lead Generation Project Management Access Data loss Employees File Management Regulations Compliance Covid-19 Hacking Office Tips Backup Customer Relationship Management Edge Money Hard Drive Apple Eliminating Downtime Business Continuity Applications Remote Monitoring and Management Windows Synergy Chrome OS Digital Profitability Computer Storage IT Support Data Batteries Reporting Update Internet Risk Management Remote Support Worker Downloads Blockchain Printer Server Specifications Social Media Health Virtual Reality Dark Web Safety Business Computing Cabling Cleaning Quick Tips Bandwidth Alert Wearables Personal Information Knowledge Remote Workers Tip of the week Customer Service Hard Disk Drive Management Hosted Desktop Employer-Employee Relationship Data Security Malware Tech Terms Financial Users Processor Remote Microsoft Teams Government Computer Care Leadership HIPAA Smartphone Productivity HaaS Holidays Shadow IT Printer Dongle Files Microsoft Staff Tactics Wireless Streaming Media Excel Mobility Analysis Unified Communications Threat Tablet Telecommute Memes Botnet Windows 10 File Sharing Artificial Intelligence Congratulations Movies Samsung Employee-Employer Relationship User Security Managed IT Service Microsoft Office 365 Scams VPN Google Drive Bring Your Own Device Tech Support Plug-In News Budget Tip of the Week Spyware Business Intelligence Regulation Current Events Internet of Things Cryptocurrency Training Productivity App Firewall Upgrade Email Millennials Ransomware Chrome Innovation Saving Money Automation Router Server Management Wireless Internet BYOD Hosted Solutions Passwords Business Management Education Computers Maintenance