Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Creating Your Shortcut

First, you should right-click anywhere on the desktop that isn?t already filled up by an icon or application. You can then select New from the menu that appears. Next, select Shortcut.

You?ll see a new dialog box that asks you to provide a program, file, or folder that you?d like to make a shortcut for. You can use the Browse button to find the file locally. If you have found the file, folder, or program you want to open, hit the OK button. You?ll see the file path populate in the dialog box. Click the Next button, and you?ll be asked to give your shortcut a name. Once you?re ready, click Finish. That?s all there is to it!

Of course, the option to move the folder or file to your desktop also exists, but we urge you to consider who else might require access to that file or folder. For example, if you have a file stored on your network, the last thing you want is to move it from your network to your desktop, thus preventing anyone else from accessing it in their time of need.

Plus, depending on your role within your organization, you might not have permissions to do such a thing in the first place. It?s better to just make a shortcut on your desktop and use that to access the file or folder. It?s cleaner and more effective.

There are many benefits to keeping your files and folders stored in a centralized location, including the ability to back up said data in the event of a disaster.

If you?re interested in doing so, you can also pin a specific file, folder, or program to the taskbar at the bottom of your screen, also allowing easy access. To do this, just click and drag the specified file, folder, or program to the taskbar. You can then click on it to access it whenever you need to.

We hope you find some value in this tip! Be sure to keep an eye on our blog for more just like this.

Related Posts

Mobile Device Management is Critical for Today's Business

Security Enhancement Security is the name of the game and MDM helps enhance the security of mobile devices by policy enforcement. It gives organizations the ability to configure and enforce settings such as password complexity, encryption, and can even wipe a device in the case of theft or loss. It also provides real-time monitoring and alerts for potential security threats, allowing administrato...

Six Reasons Your Laptop?s Battery is Dead

Battery Capacity The obvious answer is that the capacity of the laptop battery plays a crucial role in determining how long it can power the device. A lot of times, smaller and thinner laptops often have batteries that aren?t big enough as they aim to maintain a lightweight and portable design. Power-Hungry Components Some laptops come equipped with power-hungry components, such as high-perform...

Four Technologies You Can Use to Better Protect Your Data in Transit

Encryption Implementing strong encryption protocols works to secure data during transmission. From a technical point of view: SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols are commonly used to encrypt communication between a user's browser and a website. This added encryption ensures that any information exchanged is secure and cannot be easily intercepted by people looking to...

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...