Skip to main content

Some useful Windows System Shortcuts

F1         :Help
F2         :Rename the selected item
F3         :Search for a file or folder
F4         :Display the address bar list in File Explorer
F5         :Refreshes the current window.
F6         :Moves among panes in a window
F10        :Activates the Menu bar
   
CTRL+C                       : Copy
CTRL+X                       : Cut
CTRL+V                       : Paste
CTRL+Z                       : Undo
CTRL+B                       : Bold
CTRL+U                       : Underline
CTRL+I                         : Italic

CTRL+ESC                            : Open Start menu
CTRL + F4                             : Close the active document
CTRL + (plus)                        : Zoom in
CTRL + (minus)                     : Zoom out
CTRL + RIGHT ARROW      : Move the cursor to the beginning of the next word
CTRL + LEFT ARROW         : Move the cursor to the beginning of the previous word
CTRL + DOWN ARROW      : Move the cursor to the beginning of the next paragraph
CTRL + UP ARROW             : Move the cursor to the beginning of the previous paragraph
CTRL+Windows Logo+F       : Find computer

ALT+TAB                               : Switch between open programs
ALT+F4                                  : Quit program
ALT + ENTER                        : Display properties for the selected item
ALT+F6                                  : Switch between multiple windows in the same program
ALT+SPACE                           : Displays the main window's System menu
ALT+underlined letter in
                                      menu : Opens the menu
ALT + LEFT ARROW           : Back
ALT + RIGHT ARROW         : Forward
ALT + PAGE UP                    : Move up one screen
ALT + PAGE DOWN             : Move down one screen
ALT+DOWN ARROW           : Opens a drop-down list box

SHIFT+DELETE                   : Delete item permanently
SHIFT+click+Close button    : Closes the current folder plus all parent folders.
SHIFT+Windows Logo+M     : Undo minimize all

Win                                : Start menu
Win+F1                         : Help
Win + B                         : Set focus in the notification area
Win+D                           : Minimizes all open windows and displays the desktop
Win+E                           : Windows Explorer
Win+F                           : Find files or folders
Win + H                         : Open the Share charm
Win + I                          : Open the Settings charm
Win + K                         : Open the Devices charm
Win+L                           : Lock the computer
Win+M                          : Minimize all
Win + O                         : Lock device orientation
Win + Q or S                 : Open the Search charm
Win+R                           : Run dialog box
Win + T                         : Cycle through apps on the taskbar
Win + U                         : Open Ease of Access Center
Win + V                         : Cycle through notifications
Win + SHIFT + V           : Cycle through notifications in reverse order
Win + W                         : Open the Search charm and search for settings
Win + X                          : Open the Quick Link menu
Win + Z                          : Show the commands available in the app
Win + ,                           : Temporarily peek at the desktop
Win + PAUSE                 : Display the System Properties dialog box
Win + ENTER                 : Open Narrator

Comments

Popular posts from this blog

Fatal exception errors and how to fix them

              'A fatal exception XY has occured at xxxx:xxxxxxxx' What is it? A fatal exception error is an error that causes a program to abort,returning the user to the operating system.When program encounters an exception that is invalid or unknown,fatal exception error(fatal 0E) is thrown.It mainly occurs during the computer's booting process,shutdown process or while trying to launch a program in windows.The processor exception(XY value) ranges from  00 to 0F. xxxx:xxxxxxxx represents the 32-bit address where the actual exception has occured. 00-Divide fault 02-NMI interrupt 04-overflow trap 05-bounds check fault 07-coprocesser not available 08-double fault 09-coprocesser segment overrun 0A-invalid task state segment 0B-Not present fault 0C-stack fault 0D-general protection fault 0E-page fault 10-coprocessor error fault 11-Alignment check fault When it occurs? Attempting an illegal instruction or operation accessing junk or non-working secti

Everyday Cloud !!

Cloud Computing - delivering hosted services over the Internet. Cloud computing is getting IT services, such as email, customer relationship management or web conferencing, over the internet.Instead of buying hardware and software up front, you pay a monthly charge based on the number of users.In simple words,when you  type a query into Google, the computer does nothing with regards to answer, it's just a messenger. The words you type are sent over the Net to one of Google's numerous clustered PCs, which find  your results and send them promptly back to you. The real work in finding your answers might be done by a computer sitting in California, Dublin, Tokyo, or Beijing!!Preparing documents over the Net is a newer example of cloud computing. Simply log on to a web-based service such as Google Documents and you can create a document, spreadsheet or presentation. Instead of typing your words into a program like Microsoft Word or OpenOffice, running on your computer, you're

WHAT ARE SIM CARDS USED FOR

A SIM - short for Subscriber Identity Module - is a piece of plastic that slots into your  mobile phone.It acts as your unique ID and helps you  connect to, make calls over  a particular mobile phone network.Most SIM cards have a capacity between 32 to 128 KB.They store contacts and messages which can be transferred easily from one mobile to another. SIM also stores the ‘key’ needed to decrypt data that is encrypted when voice is trransfered from a phone to another.A unique ID called the IMSI (International Mobile Subscriber Identity)  is used to connect someone calling your mobile number to your phone. GSM phones are the ones that utilize SIM cards .The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI. This authentication key is provided by the carrier SIM authentication goes like this: On startup, the phone obtains the IMSI from the SIM card and relays it to the network,known as“request for