Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Creating Your Shortcut

First, you should right-click anywhere on the desktop that isn?t already filled up by an icon or application. You can then select New from the menu that appears. Next, select Shortcut.

You?ll see a new dialog box that asks you to provide a program, file, or folder that you?d like to make a shortcut for. You can use the Browse button to find the file locally. If you have found the file, folder, or program you want to open, hit the OK button. You?ll see the file path populate in the dialog box. Click the Next button, and you?ll be asked to give your shortcut a name. Once you?re ready, click Finish. That?s all there is to it!

Of course, the option to move the folder or file to your desktop also exists, but we urge you to consider who else might require access to that file or folder. For example, if you have a file stored on your network, the last thing you want is to move it from your network to your desktop, thus preventing anyone else from accessing it in their time of need.

Plus, depending on your role within your organization, you might not have permissions to do such a thing in the first place. It?s better to just make a shortcut on your desktop and use that to access the file or folder. It?s cleaner and more effective.

There are many benefits to keeping your files and folders stored in a centralized location, including the ability to back up said data in the event of a disaster.

If you?re interested in doing so, you can also pin a specific file, folder, or program to the taskbar at the bottom of your screen, also allowing easy access. To do this, just click and drag the specified file, folder, or program to the taskbar. You can then click on it to access it whenever you need to.

We hope you find some value in this tip! Be sure to keep an eye on our blog for more just like this.

Related Posts

Why You Need to Use a Surge Protector, Not a Power Strip

It’s easy to look at a power strip and a surge protector and question if there’s anything that actually makes them different. After all, they both give you extra plugs, right? Yes, but there’s more to it than just that. Let’s review some of the important differences between the two that make one a far better choice for your business’ power delivery needs. What’s So Different About Surge Protec...

Ransomware is One Problem that Leads to Many More

The Simple Fact is that Ransomware Hurts in Many Ways Let?s walk through what a modern ransomware attack might look like, acknowledging all the ways that the affected business would suffer as a result of the infection. A ransomware attack begins with an attacker reaching out and communicating with an intended victim as part of a phishing attack to gain access to said victim?s device or networ...

Ask a Tech: How to Choose the Right Laptop to Buy

What Should I Look For, in Terms of Specifications, When Considering a Laptop for Work Purposes? Naturally, this can vary a little based on one user?s needs as compared to another, but generally speaking, it is best to ensure that everyone?s system is running at least an i5 processor and has a minimum of eight or, ideally, 16GB of RAM (Random Access Memory). In terms of storage, you?re ideally us...

Smishing: A Variety of Phishing Attacks Utilizing SMS

The Dangers of SMS Phishing, or ?Smishing? Ultimately, any plot carried out by a scammer that is trying to either pose as someone else or urge the user to do something particularly dangerous could be considered a phishing attack. This kind of definition goes beyond simple email scams, where you get a message in your inbox urging you to click on links or download infected attachments. There are ot...