Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Better Way to Take a Screenshot on Windows

Tip of the Week: The Better Way to Take a Screenshot on Windows

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Tech Term Virtualization Saving Money Holiday Gadgets Chrome Social Media Managed IT Services Automation Managed Service Microsoft Office Cybercrime Computers Operating System Facebook Artificial Intelligence Health BYOD Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Remote Spam Office 365 Telephone Systems Managed Service Provider Alert Covid-19 Information Information Technology Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Human Resources Encryption Mobile Computing Applications Data Breach Application Remote Monitoring Law Enforcement App History Big Data Password Money Data Storage Patch Management Remote Computing Mobile Office Government Blockchain Private Cloud Paperless Office How To Office Tips Managed IT Training VPN Apps Flexibility Marketing Vulnerability WiFi Windows 7 Two-factor Authentication Word IT solutions Google Drive Entertainment Website Budget Mouse Servers HaaS Avoiding Downtime Data Security Wireless Bring Your Own Device Data Management Gmail Work/Life Balance Infrastructure Voice over Internet Protocol Settings Firewall Conferencing End of Support Education Physical Security Scam Virtual Reality Apple Safety Data Protection Sports HIPAA Redundancy Social USB Vendor Management Keyboard User Error Meetings Vendor Managed Services Risk Management Telephone System Staff Software as a Service Display Hacker Save Time Machine Learning Remote Work The Internet of Things Connectivity Lithium-ion battery Employee/Employer Relationship Cleaning RMM Computer Accessories Battery Augmented Reality Fax Server Shadow IT Fraud Legal Business Intelligence Remote Worker SaaS Digital Signage Internet Exlporer Worker Audit IT Management Cryptocurrency Printer Bluetooth PDF Network Congestion Botnet IT Plan eWaste Procurement Comparison Net Neutrality Workplace Strategy Proactive IT Unsupported Software CES Help Desk Best Practice IT Consultant Printing YouTube Charger Business Technology Wearable Technology Black Market Content Management Compliance Hard Drives Humor Access Control Retail OneNote Computer Care Managed Services Provider Instant Messaging Virtual Assistant Current Events Robot Excel Database Document Management Telephony Authentication Solid State Drive Wireless Technology Samsung Biometrics How to Downtime Remote Workers Virtual Desktop Value Processor DDoS Data storage Update Electronic Medical Records Automobile Spam Blocking SharePoint Hard Drive Google Docs Hiring/Firing Identity Theft Computing Infrastructure Virus Going Green Computing Customer Service Unified Threat Management Environment Techology Password Management PCI DSS Antivirus Laptop Assessment Password Manager Virtual Machine Windows 8 Managing Stress Windows Server 2008 2FA Customers Fiber Optics Multi-Factor Security Employee IT service Cabling Audiobook Tools Search Engine Twitter Messaging NIST Policy Cameras Touchpad Television Business Mangement Hypervisor Tablet Dark mode Smart Tech Trend Micro Trending Domains Amazon Default App Politics Advertising Addiction SMS Procedure Public Computer Recycling Saving Time Regulations Wiring dark theme IaaS Practices Shopping Maintenance Notifications Transportation Google Search Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Bloatware Safe Mode FinTech Printer Server Criminal Bing Benefits Tablets GDPR Relocation Workers Hosted Computing Social Network FENG Wireless Internet Online Shopping Investment Entrepreneur Video Games File Sharing Employees IBM Employee/Employer Relationships Smart Technology Specifications ISP Worker Commute Flash Camera Windows 365 Inventory Shortcut Wire Video Conferencing Evernote ROI Cost Management Experience Scalability Software Tips Sales Supercomputer Bitcoin Social Networking Travel Shortcuts Millennials Cryptomining Business Owner Sync Printers Point of Sale Emails Personal Smart Office Supply Chain Management NarrowBand Wireless Charging Search Monitoring Running Cable Batteries Two Factor Authentication Workforce Memory Virtual Private Network Windows 8.1 iPhone Netflix Digitize Root Cause Analysis Cables Windows Server 2008 R2 Consultant HBO Customer relationships Analytics Knowledge Music Telecommuting Manufacturing Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Best Available Data loss Chromecast Cortana WIndows 7 Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Science Uninterrupted Power Supply Biometric Security Start Menu Warranty Virtual CIO Colocation OneDrive Screen Mirroring HVAC Peripheral Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Distributed Denial of Service Monitor Analysis Using Data Customer Relationship Management Books 5G Analyitcs Mobile Administrator Windows 10s Devices Copiers Cast Enterprise Content Management Quick Tip Programming User Tip of the week MSP Ergonomics PowerPoint Reputation webinar Accountants Windows Media Player Streaming Media Emergency Smartwatch Tech Support Employer Employee Relationship Credit Cards OLED Content Professional Services Microchip Public Cloud Thought Leadership Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code