Split-screen comes in handy when you want to have two browser windows open side-by-side… The best way to learn this is to watch the video I found by RSU57 Technology…
While navigating the operating system is simple, the pool of students underutilizing their Chromebooks gets larger with each semester. From shortcuts to multitasking, we’ll help you make the most out of the speedy and lightweight operating system. Bust out your comfy sweatpants, grab yourself a pumpkin spice latte and prepare to free up your schedule this semester with these back-to-school tips for Chromebooks.
Creating a desktop shortcut using Google Chrome is quite easy. By creating a shortcut on your Window’s desktop to a favorite site will get you to the site quickly by simply clicking on the shortcut. I personally have shortcuts on the desktop to my Gmail, my calendar, my notes, my Google Drive, etc…
Here are the steps to create a Windows desktop shortcut with Google Chrome:
- Open Google Chrome and go to the site you desire to create a shortcut for. In my case, I went to my site at www.whatsonmypc.net.
- Once the site loads, go to the top right corner of the browser and click on the three vertical dots to open the Google Chrome Menu.
- When the menu opens, click on “More Tools”; then click on “Create Shortcut”
- When the “Create Shortcut” dialog box appears, you can name the shortcut whatever you want to name it. In this case, I named the shortcut “What’s On My PC”. I typically keep the name of the shortcut to a short easily identifiable name.
- You will also see an option where you can open the shortcut as a Window if you desire. My advice, leave the box unchecked.
- Click on “Create” and the shortcut will be created on your Windows desktop where it makes it easy for you to go directly to the site.
- If you decide you no longer want the shortcut, simply delete it from the desktop.
Learn how to hide columns or rows to reduce data entry errors, narrow focus, more easily compare data, or insert more columns or rows to increase the size of your Google Sheet.
The Chromebook, which runs off the Google Chrome OS platform, is a different beast in itself; BUT, let me tell you this, “I love my Chromebook”… I find myself using it more and more. If interested in seeing the different Chromebooks and their pricing — CLICK HERE —
If you are the proud owner of a Chromebook here is a quick way to get to a guide that will show you all the “Chromebook Keyboard Shortcuts”. To get to the guide, simply Press Ctrl + Alt + ? at the same time on your keyboard. You can browse through the different keyboard shortcuts or you can search for them. Below is a screenshot of what I am seeing on my Chromebook. If your Chromebook OS has not been updated you may see a screen overlay of a keyboard instead.
My favorite keyboard shortcut is Ctrl + Shift + ]] button (above the 6 key). This shortcut will allow you to take a partial screenshot.
What I have found that most people when they get rid of their devices they neglect to erase or wipe the device clean of their personal information (files, pictures, contacts, messages, etc…). The National Cyber Security Centre, UK’s independent authority on cybersecurity, has a nice tech writeup on resetting (wiping clean) and reprovisioning your iOS, Android and Windows Devices (see source link below).
For each platform, the most useful restore methods are explained in full, alongside the risks of using them. We then recommend one of the methods to use for the following four common scenarios:
- Scenario 1: Sanitising a device believed to be compromised with malware
- Scenario 2: Preparing a device which has not previously been managed
- Scenario 3: Reissuing a device to a different user in the same security environment
- Scenario 4: Sanitising a device for release to lower security domain or sale
Your metal credit card—at least, the one I’ve been using—isn’t embossed. It’s just two layers of plastic that have been adhered to a thin piece of metal. Accordingly, you can peel off these plastic layers and shred or destroy them without having to worry about the metal itself.
Did you know that the U.S. Postal Service has a feature available that allows you to digitally preview what mail you have arriving before you even go to your mailbox?
It is called “Informed Delivery” and it is available for FREE through the U.S. Postal Service. To get started — CLICK HERE — to sign up… It is a 3-step process where you will create your account, verify your identity, and receive notifications.
Once your account is created, it may take a period of time before you will start seeing the notifications in your email account. Once you start receiving the notifications in your email you will be able to view grayscale images of the exterior, address side of letter-sized mailpieces scheduled to arrive soon. You can also check the delivery status of packages and when they’re scheduled to arrive. If for some reason you do not start seeing the email previews, make sure you check your spam folder in your email client.
I have been using the service for quite a while and has saved me from making unnecessary trips to the mailbox.
If you own any smart devices at home, you may want to read this article at Malwarebytes Labs that will teach you how to tighten the security on those devices. Like anything else that is connected to the internet, there is always the risk of being compromised.
Let’s face it: No matter how often we warn about the security concerns with smart home devices, they do make life more convenient—or at the very least, are a lot of fun to play with. It’s pretty clear this technology isn’t going away. So how can those who’ve embraced smart home technology do so while staying as secure as possible?
Here are eight easy ways to tighten up security on smart home devices so that users are as protected as possible while using the new technologies they love.
Here at “What’s On My PC”, since the beginning of time, I shut down all my computer’s at night. In the morning I power the computers back up and let the computers go into sleep mode during the day when not using the computers (if I am at home). If I leave home, I shut the computers down. I do all of the above for online security reasons, home safety reasons and I like the idea that every day the computers are being refreshed when starting up in the morning. Computers sort of have a mind of their own… If you click on the source link below, you will find a good read where various gamers tell you their thinking on this.
Depending who you ask, turning off your PC at night is either a good way to save electricity or a good way to speed up the deterioration of your hardware. Or maybe it’ll help prevent the build-up of dust. Or maybe powering down and then up again uses more electricity than just leaving it to hibernate would. Or maybe the RGB gremlins will get sad if you don’t leave a light on for them. At this point there’s so much conflicting advice, it’s tempting to just throw up your hands and stop caring.
Windows 10’s reset feature is found in the primary Settings menu. This feature returns your Windows 10 installation to the default state it was in when Windows 10 was first installed. Note that this might be technically different from a “factory reset” depending on your machine’s manufacturer.
Who would have ever thought you would be able to send (and receive) money using email. With Google’s Gmail, you can. When composing an email in Gmail, at the bottom, you will see a “$” sign. If you click on that “$’ sign you will be walked through the process of sending money where a Google Pay, Debit or Bank Account is required. You can send the money to any email recipient, does not have to be another Gmail account, and it is free so long as you have one of the three bank accounts as mentioned. The first time a recipient receives money through Gmail, they will need to add a debit card to transfer the money to. After that first time, whenever someone sends money through Gmail, it will automatically and seamlessly transfer to that card. You can also “request” money using the Gmail ‘$” feature, as well.
If you aren’t sure which file type that you want to change the association of, right-click the particular file and click Properties from the resulting menu. Look for Type of file at the top of the properties window. The three-letter designation next to that is its file type. You can do it on an individual file type basis, or change all of them from one location.
Using an uninterrupted power supply (UPS) to plug your computer and monitor into is a good thing; BUT, it is not a good idea to plug a laser printer into a UPS.
Laser printers produce a high current draw that will “sag” the utility line causing low voltage situations. You may get away with plugging into the UPS for a while, but eventually, the powering up of the laser printer (especially during print jobs) will weaken the battery in the UPS. In one case I experienced, the user reported that their computer was shutting down during print jobs. The cause was the laser printer was plugged into their UPS. I have seen where a separate UPS is used exclusively for laser printers, but most people at home are not going to go to that expense.
What is a UPS (uninterrupted power supply)?
For those who do not know what a UPS (uninterrupted power supply) is… CLICK HERE to see examples. Typically a UPS will have multiple outlets with some of those outlets reserved exclusively for battery backup. All the outlets typically will offer surge protection. For home use, you will be plugging the computer and monitor into the battery backup side of the UPS. When a power outage occurs, the computer and monitor will remain “ON” for a period of time so that you can safely save your files and safely shut down the computer.
Most email services and software restrict the size of file attachments. For example, Gmail and Yahoo limit the size of an attached file to 25MB. So that 100MB video of the kids that you want to send to mom isn’t going to get through. What are your options?
Smart speakers get a lot of flak for privacy concerns, especially with the Google Home and the fact that it saves audio recordings of your interactions with it. If you want to delete these recordings, here’s what you need to do.
When you have completed an online purchase and receive notice that your package has shipped, you can track the package by entering the tracking number into the Google Search Box or in the search bar at the top of your browser. Google will then provide a link to the tracking page. This typically works with UPS, USPS, and FedEx…
Today’s tip is actually quite simple and is actually a reminder to folks who are learning to use their smartphones. When making a phone call and the connection has been established, learn to activate the speakerphone feature that will allow you to put the phone down and continue talking (and listening). Not every call would you want to do this, but I have trained myself to use this feature when I know I may need both hands to review a document, write something down, or someone else needs to hear the call, as well (like a conference call). Typically, the speakerphone feature can only be activated after the phone number is dialed.
Below is a pic of my phone and where the speaker icon is located when a call is in progress. When I tap on the “speaker icon” on my phone, I can then hear the conversation through the speaker on the phone. This will vary from phone to phone… Make sure the volume is turned up on your phone so that you will be able to clearly hear the recipient of the call.
Go to the source link at the end of the blog post to learn how to set up emergency contacts and medical conditions on different phone platforms. Emergency personnel may use your phone to access this information in the event of an emergency.
Below are the steps (from c|net) on how to set up your information for Android phones (not from Samsung).
Android phones not from Samsung
Open the Settings app, scroll to the bottom and select About phone > Emergency Information. If you don’t see emergency information in that section, try this: Open Settings > Users & accounts > Emergency information.
Regardless of how you got to the Emergency Information screen, once there you can tap on the pencil icon to edit your medical information and add emergency contacts.
If the instructions above don’t apply to your phone, lock your phone and swipe up on the screen to bring up the prompt for your unlock method (PIN, pattern, etc.). Tap on the Emergency or Emergency Call button.
Swiping and tapping the button is also how first responders can view your information.
Chrome OS has its own Task Manager utility. To launch it, open the Chrome browser and click the Menu button (three dots) and then More tools > Task manager. Or, for faster access, just use the keyboard shortcut Search + Esc
Computer Shortcut Keys: Whenever we work on the computer every time we use a mouse instead of shortcut keys. without mouse we don’t do anything. but there are plenty of computer shortcut keys which doesn’t require a mouse even we can most of the work without using the mouse. and shortcut keys makes our life easier and save some time that we waste on clicking the mouse button every time. Today I have brought 55 computer shortcut keys that can make you easier. so let’s begin.
- Press the Windows key + X (at the same time, then release), then tap U, then tap I to SIGN OUT
- Press the Windows key + X (at the same time, then release), then tap U, then tap S to SLEEP
- Press the Windows key + X (at the same time, then release), then tap U, then tap U again to SHUTDOWN
- Press the Windows key + X (at the same time, then release), then tap U, then tap R to RESTART
Windows is a vast operating system with plenty of features you might never stumble upon. Make the most of Windows 10 with these expert tips.
Here’s how to change your Gmail password in a few easy steps.
The mouse pointer and cursor in Windows 10 are very important aspects of the operating system. This can be said for other operating systems as well, so in truth, they are not unique to Windows. Many users of the popular operating system may have no idea of some of the customization can perform on the mouse pointer and the cursor. If you’re someone who is sick and tired of looking at the same old thing every day, then continue reading.
Create a Gmail signature
An email signature is text, like your contact information or a favorite quote, that’s automatically added at the end of Gmail messages as a footer. This text can be formatted and graphics can be added to really make the signature stand out.
Add or change a signature
You can put up to 10,000 characters in your signature.
- Open Gmail.
- In the top right, click Settings Settings.
- In the “Signature” section, add your signature text in the box. If you want, you can format your message by adding an image or changing the text style.
- At the bottom of the page, click Save Changes
When using Google Calendar, I personally like the month view (like you would see on a wall calendar); however, that is a matter of preference. To make your calendar go to a full-screen view,, no matter what calendar view you prefer, you can collapse the left-side menu and the right-side panel. Reflected below are instructions to walk you through this:
On the top left side of the screen, click the three-line menu icon at the top to collapse the side menu. You can toggle open the side menu by clicking on the three-line menu.
On the bottom right side, click the small right-facing arrow to collapse the side panel. This panel lets you view your Google Keep Notes, Tasks and other services. You can toggle the side panel back open by clicking the left-facing arrow.
Long Story Short: Buy a cleaning kit made exclusively to clean the screen on your smartphone. Smartphones are not cheap and the last thing you want to do is ruin the screen on your phone. You will see various DIY mixtures, but I have found it is best to get a product that is already packaged in a spray bottle that often comes packaged with a lint-free microfibre cloth. You will not regret it and you will find you will be cleaning and sanitizing your phone more often. Always spray the solution on the cloth and not directly on your phone or other devices.
What you don’t want to do: Due to the special coating on many of these smartphones, do not use household cleaners such as window cleaners, aerosol spray cleaners, solvents of any kind, bleach, ammonia, undiluted alcohol, or hydrogen peroxide.
Where to buy: If you look on Amazon (click here) you will find an array of products made exclusively to clean smartphones. The one that I specifically selected is the WHOOSH! Screen Cleaner Kit. The cleaner is designed to clean eyeglasses, smartphone, laptops, tablets, HDTV’s, and wearable tech, such as smartwatches. The kit is reasonably priced and ships with a large and small (portable) container of the cleaner with Two 6′ x 6′ cloths + BONUS Poo cloth.
We’re well into the 21st century, and the majority of smartphone users are still unaware of Wi-Fi calling. Did you know you can make calls even without a signal? No, we are not talking about Skype, WhatsApp, or Messenger calls.
On most occasions, the documents we desire to print do not need to be in paper form. The print jobs are usually something we just want to save (like a packrat). To save paper, when you go to print in Windows 10, select “Microsoft Print To PDF” and save the print result to a folder on your computer. When you do this the end result is saved as a PDF file on your computer and will look just like the print result on paper; except, it is now in electronic form. You can even email the PDF to someone else if need be; and, if you find in the future you do need an actual hard copy of the file, just pull it up and print it to your printer. Great way to save paper and I can guarantee you, if you start doing this, you very seldom will use your printer.
Within the settings of Facebook, you can determine if your account is logged into from somewhere else. For example, my wife and I share our account. If she logs into our account from home and I am away and I log into the account, she can see that I logged in, from where and what device was used to access the account. Learning this is especially helpful if you suspect someone else has your login credentials (and, if you do suspect that, change your password immediately. Do not wait…).
To get to this feature do the following:
- Click on the “down arrow” (see screenshot below) and when the menu appears, click on “Settings”.
- On the left side, click on “Security and Login”.
- At the “Security and Login” page, you will see “Where You’re Logged In’. If you click on the down arrow for “More”, a history of where the account was logged into from is generated. You can determine where and when the account was accessed.
- If you see something that appears suspicious, click on the 3 dots to the right side of the entry and when the small menu appears, click on “Not you?”. You can also select “Log Out” to log the person out. If you do click on “Not you?” details about the login is generated with an option to secure the account immediately.
Recently I posted an article, “Quick Tip: Using Google Calendar As A Journal To Keep Track of Events In the Past” where you can use Google Calendar as a journal to document events by using the “description” feature in Google Calendar. The “description” feature allows you to write paragraph’s of text (with formatting options) to describe the event or what occurred on that day.
After posting that article, I decided I needed a way to periodically print out my journal or the event descriptions and found that it is quite easy. You do not need to be using Google Calendar as a journal, but writing descriptions (or details) about events on your calendar in the past will serve you in the future as a reference.
To print out a range of descriptions that you have added to your calendar, follow the steps below:
- Open Google Calendar on your computer.
- At top right click on the down arrow that shows you the various calendar views. Typically, on mine, I keep it on “month”, but your calendar may be set to something different.
- Once you click on the “down arrow”, click on “Schedule”.
- Once you are in the “Schedule” view, click on the “cog or gear” icon and select print.
- At the “Print Preview” dialog screen, select your date range.
- Place a “check mark” in the “print descriptions” box.
- Click on “Print”
- At the “Print” dialog screen, select the destination of where you want the printed result to end up. Many times I select, “Save to Google Drive” or “Save to PDF”.
- Depending on your selection, click on “Save” or “Print” and voila’ that is it. You should now have a printed result with the descriptions you had added for past events.
Typically, when using Google Calendar, we use the calendar to keep track of events that occur in the future and once those events pass, we no longer think about them. I started thinking, why not use Google Calendar to keep track of the events that occurred in the past and be able to add a detailed description of what occurred and/or what actions were taken. With Google Calendar this is absolutely possible and is a good way to document and describe what occurred during a past calendar event. As a matter of fact, I have even started (since I am now retired) using this idea and feature to create a journal using Google Calendar, to document my day.
Here is how this works (very simple)… Open Google Calendar and initiate adding an event to your calendar and you should see the following type of window. In that window, click on “More Options”.
After clicking on “More options”, you should see a window as depicted below where you can add various details for the event. At the very bottom, is where you can add a description with various types of formatting to get creative. Also, note I only added two lines of text. You are not limited to that and can type paragraphs if you want. When done, click on “Save” and that is it. You have now added a description to the event and can go back and edit the description at any time. You can even add attachments and links. As I mentioned, I now schedule an event and will go back to my calendar entry following the event to document what occurred.
Google Chrome offers to save passwords for all your online accounts. It then stores and syncs them to your Google account as part of the Smart Lock feature. Chrome also has a built-in password generator that automatically creates strong passwords at the click of a button.
Typically, when we perform a “Google Search” we type in what we are looking for; but, did you know if you want to get more specific you can surround the text with quotes. By placing quotes around the text it prompts the search engine to search for anything that has the phrase or text you entered. If you do not place quotes around the text the search engine will search for content that contains the text, but not in the order of the phrase or text you entered. Give it a try, both ways, to see what I mean.
Computer and smartphone users at home are beginning to get curious about the new 5G cellular technology. To help you understand what the differences are between the different generations of cellular transmission technologies, I extracted the below information from a PCMag article (see source link below).
The G in this 5G means it’s a generation of wireless technology. While most generations have technically been defined by their data transmission speeds, each has also been marked by a break in encoding methods, or “air interfaces,” that make it incompatible with the previous generation.
1G was analog cellular. 2G technologies, such as CDMA, GSM, and TDMA, were the first generation of digital cellular technologies. 3G technologies, such as EVDO, HSPA, and UMTS, brought speeds from 200kbps to a few megabits per second. 4G technologies, such as WiMAX and LTE, were the next incompatible leap forward, and they are now scaling up to hundreds of megabits and even gigabit-level speeds.
5G brings three new aspects to the table: greater speed (to move more data), lower latency (to be more responsive), and the ability to connect a lot more devices at once (for sensors and smart devices).
Source: PCMag – What Is 5G?
Google Translate’s camera feature can save you time by giving you the ability to translate more than one word at a time — you can even translate an entire page of a menu.
As you know, browsing with Google Chrome or any browser for that matter, your privacy is compromised to the degree that your browsing habits, etc… leave tracks as to where you have been. This is typically done via cookies (that identifies the user when you visit specific sites) and via your browsing history. This is all fine and dandy to a certain point, but there may be occasions where you do not want this information stored and want to protect your identity.
The solution to this problem, on those certain occasions, is to go “incognito”. If you look up in the dictionary, “incognito” is defined as “having one’s true identity concealed”. Nearly all browsers give you the ability to go into “incognito” mode, but for the sake of this article, I am going to tell you how to get into “incognito” mode using Google Chrome. It is very, very easy…
Simply click the vertical three-dot icon on the top-right of the browser and select “New incognito window.” On mobile, tap the three-dot icon on the bottom-right (iOS) or top-right (Android) and select “New incognito tab.” That is it, simple as that… In Google Chrome, when in incognito mode you will see a darkened browser background and you will obviously see “You’ve gone incognito”. You can also get into “incognito” mode by hitting “Ctrl+Shift+N” in combo, on your keyboard.
Now, something I do want to point out. This does give you some privacy protection to a certain point, but do not think this is keeping you from being seen at work. Incognito mode only is concealing your behavior. On work networks, the network administrator, if necessary can track unusual activity via a workstations or devices IP address.
If you have that specific friend that you are tired of seeing their rampant political postings (or any type of posting for that matter) that goes against your views; yet, you do not want to offend them too much by unfriending them, there are several quick options in Facebook to fix this.
Here is how to do this:
The next time you see a post from this friend, look in the upper right corner of the post and click on the three dots (also called an ellipsis). A dropdown box will appear where you will see the following options:
Hide Posts – see fewer posts like this. (Facebook will attempt to block any further postings such as what you are seeing; BUT, you will still see other postings from this friend).
Snooze XXX for 30 Days – Temporarily stop seeing posts. (This option gives you a break from the friend and you will not see any postings from the friend for 30 days).
Hide All From XXX – Stop seeing posts from this person. (This option is the nuclear option. You will stop seeing the friends posts; BUT, they will still remain a Facebook friend and they will not know any different).
For you Chromebook user’s out there, here is a powerful Chrome OS tip that is many times overlooked.
When you tap the “Search Key” (on your keyboard) or hit the circle icon in the lower left corner of the screen (on the app launcher), you are given the power to search for anything. All you need to do is start typing and whatever it is you are searching for will appear. You can search for and find websites, get answers to specific questions, open apps, find files on your Chromebook, etc… For example, in the screenshot below, I clicked on the circle icon and started typing “What’s On My PC” and immediately search results started to populate.
Choose a time limit for how long you want your activity data to be saved—3 or 18 months—and any data older than that will be automatically deleted from your account on an ongoing basis. These controls are coming first to Location History and Web & App Activity and will roll out in the coming weeks — Read More @ Google
You will need a microphone attached to your computer in order to take advantage of this overlooked “Google Search” feature. When performing a search, on your computer using Google, teach yourself to click on the microphone to dictate what you want to search for. You will soon find that this is much faster than typing and is fun to do.
Think about all the photos you have stored that your family and friends would like to have — or personal account information that your beneficiary will need to know about in the event of your death. There may be important files that you have stored on your Google Drive that someone will need access to. For those reasons, it’s a good idea to take five minutes and let Google know what to do with your data.
Open File Explorer, and find the zipped folder.
To unzip the entire folder, right-click to select Extract All, and then follow the instructions.
To unzip a single file or folder, double-click the zipped folder to open it. Then, drag or copy the item from the zipped folder to a new location.
When I was managing a computer network and teaching others, one of the first things I would teach people is how to lock their computer when they walked away from the computer for an extended period of time. In the work environment, this is especially important from a privacy and security perspective.
With Windows 10 the easiest method is to hit the Windows Key + L . When you return to your computer to start working again you will be required to enter your password or pin.
A more modern automated method is also available in Windows 10 and it is called “Dynamic Lock” where you can pair your PC and your Smartphone via bluetooth; providing, your computer is bluetooth ready. You can setup “Dynamic Lock” by going to Start > Settings > Accounts > Sign-in options
With Gmail, you can not only enable keyboard shortcuts, but create custom combinations to make your experience as efficient as possible. How do you do this? Let’s find out.
These two keyboard shortcuts work in Google Chrome and Microsoft Edge for sure; and, may work in the other web browsers as well.
- When wanting to go a page backward in your web browser you typically mouse click on the “back button”. You can also perform the same function on the keyboard by hitting the “ALT + “left arrow” keys.
- When wanting to go a page forward in your web browser you typically mouse click on the “forward button”. You can also perform the same function on the keyboard by hitting the “ALT + “right arrow” keys.
Different types of cookies keep track of different activities. Session cookies are used only when a person is actively navigating a website; once you leave the site, the session cookie disappears. Tracking cookies may be used to create long-term records of multiple visits to the same site. Authentication cookies track whether a user is logged in, and if so, under what name.
Source: Norton by Symantec