Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 10 Handy Windows 10 Keyboard Shortcuts

b2ap3_thumbnail_shortcuts_for_windows_10_400.jpgWith the launch of Windows 10, many users are upgrading and loving every second of it. As always, a new operating system comes with a learning curve, including getting to know the new features and keyboard shortcuts. To get the most out of Windows 10, you can try these ten great hotkey combinations to get through your workday with blazing speed.

[WinKey + S] Activates Cortana
[WinKey + C] Activates Cortana with Speech
Microsoft’s Cortana feature, which was once exclusive to Windows Phone users, is now built into Windows 10 by default. She acts as a personal voice assistant, much like Apple’s Siri. You can use these shortcuts to make more effective use of Cortana.

[WinKey + Ctrl + D] Creates a New Virtual Desktop
[WinKey + Ctrl + F4] Close Virtual Desktop
[WinKey + Ctrl + Left or Right] Switch Between Virtual Desktops
One of the neat new features Windows 10 offers is virtual desktops, which will most likely be used by enterprises to enhance productivity. You can easily use the above keystrokes to navigate through your current virtual desktops, plus open and close them on your local desktop.

[WinKey + Shift + Left or Right] Move Apps from One Monitor to Another
Workers generally use two monitors to get the most done, but if you’re working with several different applications, it can be a bother to continually resize the windows and move them about. To make this process much easier, use the above keystroke while you have a window selected.

[WinKey + K] Activates Connect Feature to Stream to Wireless Displays and Audio Devices
This keystroke is pretty self explanatory, and it will be used often by those who regularly access Connect.

[WinKey + R] Run a Command
Regardless of how many new features there are in Windows 10, the basics still apply. You’ll want to access the Run Command function. This keystroke makes it much easier to do so.

[WinKey + I] Opens Windows 10 Settings
As one of the most customizable operating systems Microsoft has created, Windows 10 offers plenty of great ways you can put the “personal” back in your PC. Use this keystroke to make navigating to your settings easier.

[WinKey + G] Activates the New Xbox Game Bar to Let You Record Games or Take Screenshots
All you gamers out there are going to love this keystroke.

For more ways you can get the most out of Windows 10, keep an eye out for more productivity and technology tips from Total Tech Care.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Chrome Tech Term Virtualization Social Media Saving Money Holiday Gadgets Microsoft Office Automation Managed IT Services Managed Service Artificial Intelligence Computers Facebook Cybercrime Operating System Hacking Wi-Fi BYOD Mobile Device Management Networking Health Internet of Things IT Support Spam Office 365 Covid-19 Telephone Systems Information Technology Remote Managed Service Provider Information Alert Mobility Router Bandwidth Recovery Employer-Employee Relationship BDR Social Engineering Remote Monitoring Password Money App Encryption Mobile Computing History Applications Application Law Enforcement Human Resources Data Breach Big Data Apps How To Office Tips Training Data Storage VPN Patch Management Government Blockchain Paperless Office Private Cloud Remote Computing Managed IT Mobile Office Bring Your Own Device Infrastructure Data Management Data Security Work/Life Balance Voice over Internet Protocol Flexibility Marketing WiFi Wireless IT solutions Entertainment Google Drive Website Budget Gmail Vulnerability Settings Windows 7 Avoiding Downtime Word Two-factor Authentication Servers Mouse HaaS User Error Cleaning Meetings Vendor Managed Services Display Risk Management End of Support Hacker Education Physical Security Employee/Employer Relationship Data Protection Safety RMM The Internet of Things Sports HIPAA Lithium-ion battery Redundancy USB Keyboard Conferencing Scam Firewall Telephone System Staff Virtual Reality Software as a Service Apple Vendor Management Machine Learning Save Time Connectivity Social Remote Work Identity Theft Compliance OneNote Computer Care Managed Services Provider Current Events Computing Infrastructure Going Green Wearable Technology Telephony Virus Database Retail Hard Drives Samsung Remote Workers Augmented Reality Unified Threat Management Instant Messaging Fraud Excel Computer Accessories Robot Processor Battery Value Shadow IT Remote Worker Biometrics Legal Electronic Medical Records Virtual Desktop Spam Blocking Hard Drive Cryptocurrency Internet Exlporer Hiring/Firing DDoS Printer Bluetooth Computing SharePoint Comparison PDF CES Proactive IT Customer Service Business Technology Business Intelligence Content Management Environment IT Consultant Best Practice YouTube Digital Signage Access Control Audit Worker Black Market Fax Server Humor Virtual Assistant IT Management Authentication SaaS Botnet Procurement IT Plan Document Management Solid State Drive Workplace Strategy Wireless Technology Net Neutrality How to Downtime Network Congestion Unsupported Software Help Desk Update Printing eWaste Charger Data storage Automobile Google Docs Point of Sale Personal Administrator Sync Cryptomining Devices Emails Enterprise Content Management Shortcut Monitor Supply Chain Management Batteries MSP Accountants Cost Management Monitoring Credit Cards Two Factor Authentication Windows 8.1 Digitize Microchip Thought Leadership Social Networking Netflix Password Management Root Cause Analysis Windows Media Player Password Manager Reputation User Streaming Media PowerPoint Windows Server 2008 R2 Customer relationships Tech Support HBO Content Knowledge Multi-Factor Security Music Techology Email Best Practices Laptop IT Assessment Search Engine Running Cable Skype Manufacturing Twitter NIST Data loss Business Mangement Memory Customers Managing Stress Computer Tips Managed IT Service Outlook Security Cameras Smart Tech Audiobook Leadership Trending Troubleshooting Amazon Virtual CIO Touchpad OneDrive Start Menu Cameras Biometric Security Addiction Screen Mirroring Recycling Loyalty Peripheral Digital Security Cameras Using Data Wiring Frequently Asked Questions Practices Politics Advertising Books Amazon Web Services Science Copiers Mobile 5G Cache Windows 10s Safe Mode Cast Criminal Quick Tip Notifications Ergonomics GDPR Tip of the week Smartwatch Hosted Computing webinar Emergency Online Shopping Employer Employee Relationship Development Distributed Denial of Service Professional Services Printer Server OLED Wireless Internet Customer Relationship Management Public Cloud Virtual Machine File Sharing Analyitcs Assessment Relocation PCI DSS 2FA Fiber Optics Camera Windows Server 2008 Employee Inventory Programming Specifications Evernote Video Games Messaging Tools Cabling Wire Hypervisor Worker Commute Television Travel Policy Dark mode Trend Micro Printers Antivirus Experience Millennials Wireless Charging Windows 8 Scalability SMS Default App Smart Office Saving Time IT service Business Owner Public Computer Procedure Transportation dark theme NarrowBand Shopping Virtual Private Network Regulations Google Search Workforce Computer Fan Cables Tablet Search Rootkit AI IT Infrastructure Domains Bing iPhone FinTech Benefits Consultant Social Network Project Management Nanotechnology Workers Telecommuting FENG Cortana IaaS Analytics Investment Maintenance Employee/Employer Relationships Digital Signature Bloatware IBM Files Employees Smart Technology Windows 365 Chromecast Best Available Warranty Flash ISP Google Apps Tablets WIndows 7 Video Conferencing ROI HVAC Uninterrupted Power Supply Bitcoin Software Tips Shortcuts Analysis Entrepreneur Supercomputer Colocation Sales

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code